Manuscript Bicol College-June 2, 2023
Manuscript Bicol College-June 2, 2023
INTRODUCTION
Security survey is the formal process used to review specific areas, applications,
and/or validate the program in place. The purpose of a security survey, defining security
survey goals, and building survey program and components of a security survey is
While schools are thriving to meet the educational needs of the students and of the
community, they themselves, as open systems, are open to every kind of security threads
coming from inside and outside of the school environment. Due to the social, economic,
and cultural conditions of our time, various individual or group threats may be
pandemic diseases, fires, and many natural disasters such as earthquakes, floods,
landslides, and so on. And the school management, together with the school community,
must be prepared for all these kinds of threads, and must develop strategies to deal
Since the threads to school security may stem from various sources in the society,
the school safety issues should comprise a wide range of bodies such as educators,
student, managers, parents, law enforcement agencies, health institutions, businesses, and
2
the like which accommodate so many students, teachers, managers and other supportive
individuals, are compelled to provide safe working conditions for staff and for the
students. The schools can ensure a safe environment by focusing prevention, intervention,
and response phases in their safety efforts. To deal effectively with antisocial and crime
behavior, schools should promote positive school climate and school-wide effective
Considering the current economic situation and the need to improve or innovate
services, public law enforcement agencies are finding that the private security industry
has started to assume certain traditional police functions. This trend can be identified in
various areas of the country where private security personnel perform duties ranging from
school crossing guards to unarmed residential patrols. From the stereotyped uneducated
and poorly trained person, security personnel have become more professional and
organized. National research projects have focused on the private security industry and
the tremendous changes and growth it has undergone in the past 20 years. With all the
research and recommendations for improvement, the field security survey is becoming a
more respected profession. Some colleges and universities offer courses in security
survey and some even offer as a specialization for a major area of study.
Every installation cannot yet escape the emerging complicated security problems
like the deteriorating peace and tranquility, the threat of terrorism and the social
conditions of the community. Hence, a basic understanding on the concept and methods
it private or public are not exempted from the harsh environment. According to Eboña
(2020), who studied security measures in a private school, a school which is manned by
3
the private security agency is highly effective in its management style for their security
personnel is controlled by external or separate entity. Their work ethics are highly
observed for they are supervised by trained and competent security officers especially
various studies in recent years have shown that the schools are not so safe for the students
and for the school personnel any more due to some problems threatening school security.
Montee (2020), receiving attention to the responsibility of schools for providing a safe
environment so that students and teachers maximize the education experience, states that
schools are faced with numerous issues involving school safety. From preparing for
natural disasters to preventing school violence and protecting students from illnesses,
school administrators are seen responsible for ensuring that students are safe at schools.
of each school in dealing with security problems. Each school has its own characteristics
and security problems and specific handling strategies. Similarly, Scheneder (2021) states
that there is no simple solution to school safety. Every campus has a unique mix of
On the other hand, Ellul (2019) suggests that schools which are managed by
internal security offices tend to perform less performing on the context that most of them
are not well compensated and on contractual basis. Nordquist (2020) states that effective
regulated by the state or not. It is management who decides what money is spent where,
what rules and procedures are established and enforced, and who has specific
4
assuring security. If you have security problem in your organization, you have a
management problem. Those in charge of security must be given the necessary authority
to fulfill their responsibilities and must have access to top level management. Lines of
continuous to assure the full benefits of security equipment, procedures, and personnel.
safety must work. Beyond policy, the presence or absence of personnel, funds, technical
expertise, and data can also, in different ways, support or retard stakeholders’ efforts
Relatively, some of the security guards need to improve their level of capability.
Security guards are the key security personnel in the entire business. They have enough
knowledge of the essential functions and responsibilities in securing life and property. In
this connection, the capability of the security guards made the security client and security
agency manifest the kind of security personnel they had acquired. Organizations are run
and guided by individuals. It is through individuals that goals are set and objectives are
realized. The achievement of an association will along these lines rely upon its capacity
performance management practice plays a massive role in ensuring the success of the
security personnel not only professionally but also contributes to their overall well-being.
5
workplace. It is the reality of the security agency to recognize security personnel who do
better than their peers. Every security personnel can make a difference to the overall
success both in the security agency and the client. The fundamental dilemma that is faced
today both by individuals and management is how to fairly and objectively manage their
of its security personnel and giving recommendation to client for disposition of its
security personnel. Thus, this leads to high employee turnover thereby affecting
With regard to the aforementioned statement, problem that sought and aimed at
aligning security personnel's work efforts with the objectives both security agency and
client, manage these efforts daily, evaluate and monitor security personnel performance,
employee contribution to the security agency's success are issues that security agency
need to resolve, thus this research study seek to mitigate and find solution to suppress
request in both government and private foundations depends on such a significant amount
government security monitors, is make sure whoever is inside the structure, foundation or
office under their supervision is sheltered from any mischief, savagery, or something
else, which might be malignantly arranged by another substance for monetary profit,
With an in-depth analysis of the studies, it was noted that most of the studies
focuses on the to the management styles, nature of organization and business planning.
This present study is the only study that will assess the requirements of security agencies
This study identified the security preparedness and amenities that were utilize ain
a. Perimeter barriers
d. Protective lighting
f. Restricted areas
g. Utilities
Assumptions
security .
Literature Review
Common security measures that schools have implemented are school resource
evacuation plans, and a system for controlling entry of intruders during school hours
(Burke & Herbert, 2020). School security measures were intended to increase safety and
services which includes residential and commercial security, commercial fire detection,
environmental monitoring, medical monitoring, and video services. Despite the general
feeling on the ground of inadequate remuneration, security officers felt that their wages
were better than nothing. Security officers indicated that the contrast between the
expectations of work and actual reality was a disappointing experience. Some were of the
view that being unemployed was better because they expect to live in poverty, even
Undoubtedly, some of the common issues that may contribute to high labor
turnover are few advancement opportunities and being employed in a dead-end job
without any opportunities for promotion. Poor work/life balance because of shift work
and shift patterns make it difficult for guards to visit their families, mostly because they
need to travel to their place of residence, often a few hours travel time from their place of
work.
Nevertheless, one way to ensure that security guards feel that they are working
towards a common goal is to instill in them a sense of loyalty and belonging. This may
require rewarding loyal security officers with monetary bonuses, increased responsibility,
communicated clearly, not only at the start of their employment, but continuously
throughout their careers. Ambiguous tasks will result in security officers showing a lack
of initiative and accountability which will lead to failures in executing their tasks. It is
imperative for security guards to have realistic job expectations because this will
positively impact on the outcome of goal achievement. Unrealistic job expectations, such
as job boredom, could result in demotivated employees. Hence, in the role as a security
officer, it is necessary to have clear and unambiguous job clarity to avoid disillusioned
officers.
Noguera (2020) found that different aspects of the structure and function of
schools would increase the likelihood of acts of violence occurring there. According to
Noguera, these aspects of structure and purpose in schools served three main functions
9
over time. First, schools have been mainly operated as agents of social control; schools
have long been charged with maintaining a custodial role like that of the asylums, which
was to regiment, control, and discipline those who attended. The second function of
schools was to acclimate a large number of children of European descent. Third, schools
were designed to primarily prepare students to become future workers for United States
industry. These three goals have had a direct influence on school policy and the way
schools have developed. Order, efficiency, and control dominated the early development
of schools in the United States. There became a time where control and compliance were
increasingly difficult to manage, and many urban schools lowered their expectations
about behavior. These lower standards of behavior caused the schools to start to lose
control and compliance by students. It was about this time that schools started to focus on
average daily attendance because it was the basis of funding formulas and an area that
According to Noguera (2020) the historical preoccupation that schools have with
control has limited the ability of administrators to respond to the crisis created by the
increase of violence and disorder. Noguera went on to indicate that the strategy many
school districts are adopting is one of converting schools into prison-like facilities. He
suggested that these schools believe the best way to reduce violence is to identify
potential students who may commit acts of violence and to exclude them from the other
students. Noguera believes that schools must find ways to create more humane learning
environments that will lessen the feelings of alienation, fear, and repression for students,
Morrison, Furlong, and Morrison (2021) offer a guide for safe versus unsafe
schools. These authors believe that safe schools are effective and unsafe schools cannot
and will not be effective. They believe that unsafe schools are characterized by chaos,
stress, and disorganization. These schools seem to lack clear and consistent school
disciplinary expectations and have poorly designed physical space. This poor physical
design may not allow staff members to properly monitor and supervise student behavior.
Safe schools seem to be characterized by a more positive school climate and atmosphere.
According to Garcia (2019) these schools have high levels of student, staff, and
parent participation. He goes on to say that students in safe schools seem to feel more
attached to their school and have clear and high expectations for student performance and
behavior. Schools are a place where children from diverse racial and cultural
` Regulus (2020) indicated that this diversity could contribute to incidents of violence due
to racial tension, cultural differences in attitudes and behavior of children from different
neighborhoods. Regulus proposed a program that would cause the integration of a staff
culture that emphasizes nonviolent means of conflict resolution with the student culture.
The influence of a peer group is often reflected in student culture, along with the need for
independence and autonomy. Regulus (2020) indicated that students often struggle to
establish a personal identity and to maintain personal racial or ethnic identity. Schools
facing racial or cultural issues demonstrate that schools do not operate in a social or
cultural vacuum. Researchers and educators have found that the culture of a school is
related to the level of school crime and violence at a particular school. This relationship
has significant implications for intervention programs in that school. Heilman & Beaton
11
(2020) indicate that schools placing great emphasis and effort on altering the general
culture within the school building will find it difficult to maintain and sustain a change
over time without support from the neighborhood or a change in the surrounding
community. This concept is expanded further and supported by the high recidivism rates
among juvenile offenders. Many times, after incarceration, individuals return to the very
environments, peer groups, neighborhoods, and social factors that helped to contribute to
School factors that seem to be conducive to disorder, crime, and violence include:
relevance; combined with (d) low student academic achievement and apathy, which give
rise to disruptiveness; (e) poor facilities design and portable buildings that both increase
isolation and hamper internal communication; and (f) teacher failure to act because
admit a problem, believe nothing will work, or simply do not know what to do (Rossman,
2020). Facilitators fail to act when they feel that they don’t have the complete
received the necessary training the situation requires. Schools have trouble attracting and
retaining good teachers when their culture and climate has a reputation of fear, violence,
and crime. In addition, school discipline may suffer as teachers hesitate to confront
misbehaving students because they fear for their own safety. Most students are
discipline or force to gain compliance and retain order in the classroom (Rossman &
Morley, 1996). Thayer (1996) maintained that many times teachers are unprepared to
12
deal with the challenges brought by their students and the system within which they must
operate.
According to Walker and Gresham (2020), teachers in large schools and crowded
students. These authors went on to indicate that the development of these relationships is
especially true for at-risk students who have more intense needs for attention and
involvement. Walker and Gresham maintained that another challenge for overcrowded
schools is that they have more discipline and vandalism problems. Heilman & Beaton
(2020) believe that a high student-to-teacher ratio makes it nearly impossible for teachers
to effectively monitor their students' behavior and the result is an increase in discipline
increasingly isolated from each other, from parents, and from the neighborhoods and
communities where their students live. Walker and Gresham (2019) believe that many
schools have attempted to become virtual fortresses of safety, steps that have been in
response to the escalating rates of violence. All these conditions make it extremely
difficult for schools to effectively educate their students. There seems to be many
repercussions from oversized and overcrowded schools that have a high student-to-
teacher ratio.
Webster (2020) indicated that staff members just don’t have the time to monitor
and discipline students. The result is less time to educate, motivate, and teach. Webster
believes that the specific incidents of conflict and disagreement that are known to precede
acts of aggression behavior and violence may go undetected in large classrooms, in the
13
lunchroom, or on the playground due to lack of supervision. He went on to point out that
many very good intervention programs exist, but like conflict mediation, they can only
find the time to mediate the most serious forms of disagreements. If these programs were
to mediate all the minor conflicts, teachers would have little time to spend on
instructional activities.
Webster (2020) indicated that the lack of time creates a situation where only the
most serious forms of conflict and disagreement are dealt with, thus causing negative
reinforcement, because these are the events, which receive attention and mediation. He
went on to indicate that the "minor" disagreements, which happen more often, go
undetected and are rarely mediated. These minor undetected events will probably not be
revealed by security measures. Security Measures Many people believe that security
measures are needed in schools. Educational researcher Paul Garcia (2020) asserted, “It is
estimated that every day 270,000 guns go to school with students” . Garcia further stated,
“More than one out of four high school seniors reported having been threatened with
This trend from the mid-nineties of students taking weapons to school seems to
be holding steady in recent years. More support for the implementation of security
measures comes from Friedland (2020) when he reported, “More than 6,000 students
were expelled from schools last year for possession of a weapon or for making
threatening statements, according to the first annual School Safety Report” . These
numbers make a strong case for some sort of action to increase safety for our students and
staff.
14
Security and crime-preventkm programs and measures that have proven effective
security equipment; and a focus on the necessary principles of continuous quality security
improvements.
measures by conducting an assessment may give schools a more balanced and rational
array of security measures. Hylton (2020) indicated his belief of this concept when he
said, “Effective school planning begins with a commitment to make safety/security a top
priority and integrate security programs and systems into the school infrastructure” .
Schools that make the decision to plan for security using an assessment tool must then
decide what the assessment will include. Trump (2020) said, “Assessment methods
should include structured interviews with members of the school staff and community,
analysis of policies and procedures, review of crime and discipline trends, examination of
physical facilities, and an analysis of other school and community information sources” .
These assessments should be comprehensive and provide insights that can be used now
and in the future. Trump recommended that assessments should be comprehensive when
recommendations that can be used in both short and long-term planning”. Hylton (2020)
15
believes that these plans should include ways to integrate security measures into schools
in a subtle way that minimizes the negativity associated with the implementation.
Friedland (2021) indicateed that more metal detectors are in place in schools than
ever before and that schools are employing more security personnel than in the past He
went on to state, “In spite o f these security-based, curative measures, violent acts
continue to occur with some frequency in our public schools.” Friedland (2021) further
reported, “If all schools do is add guards or metal detectors or put students in uniforms or
expel them, it won’t work” (p. 14). Halford (2020) noted, “Other recent research on the
settings” .
New York City schools reported, “Despite spending more than S28 million during the
1980’s fix’ the installation o f metal detectors at public schools in New York City, crime
and violence continue to be a major concern”. Noguera used yet another example where
metal detectors have failed to provide safety for students in schools, when he sited an
were shot at a school despite the presence of metal detectors”. Noguera maintained that if
a student really wants to take a gun into school, he will get it in even when metal
detectors have been implemented to stop guns being brought to school. Although, there
are schools that are reporting success with programs that include metal detectors. Burke
and Herbert (2021) claimed that “Threats of violence were treated as seriously as
assaults, and metal detectors were used to screen spectators at school sporting events.
16
Foss High School was becoming a safe and secure place to leam”. This section regarding
metal detectors and other hardware can best be summed up by a quote from the National
Center for Injury Prevention and Control. “The center’s research lends authority to what
many educators already know: that focusing on the hardware of control will not resolve
dilemmas involving the software of our students’ hearts”, observed Halford (2020). The
Theoretical Framework
This study adopted the the first theory of Convergence to establish the
relationship between ICT and security as far as identification is concerned. Both theories
illustrate ongoing changes in the society and go back to synthesize the theoretical
Robert Cox has argued that “all theories have a perspective,” and feminist
researchers have advanced similar ideas when questioning assumptions about objectivity,
‘and methodologies that claim the neutrality of their facts and the universality of their
interests are assumed to be non-existent, the work is far less trustworthy than that of a
researcher who explains their position, perspective and involvement. Rather than an
The second theory adapted by this study is anchored on Social Control, and third
is procedural justice theories which indicate that informal social control reduces problem
behaviors. However, many schools have implemented formal control mechanisms such as
school security measures. It examines the association between school security measures
17
(security personnel, metal detectors, and surveillance cameras) and students’ perceptions
of informal social control (relationships with teachers, other school adults, and the
This study is anchored by the theory of Baron (2020) which states that the main
value of latter to: communicate a shared vision of the purpose and values of the
organization; define expectations of what should be delivered and how this should be
done; ensure that people are aware of what constitutes high performance and how they
means of recognizing endeavors and achievement through feedback; and enable people to
monitor their own performance and encourage dialogue about what needs to be done to
improve performance.
important workplace concept. Here, the paper has highlighted the various aspects of
aspects can impact the job satisfaction of employees and also their behaviour in terms
of organisational behaviour.
Organizational Justice is the word used for describing the various types of
problems and issues faced by the employees of an organization which they term as
injustice. This terminology focused on the fact that how an employee can judge the
behavior of the organization and the employee’s resulting attitude and behavior (Baligh,
2009). For example, if a particular organization removes some employees without any
proper cause, the other remaining employees might feel a sense of injustice which might
18
result in the change in their attitude this would result in the drop of productivity. These
viewpoints can make an impact on the attitudes and behavior of the employees which can
be either for good or bad side and this makes a positive or negative impact on the
performance of the employees and along with it affects the functionality and success of
the organization.
The theory behind of the term “organizational justice” goes beyond the long-
established models of work-related behavior that makes the concepts of demand, control
and social support in terms of job being the main factors which helps in determining the
wellbeing and also the extent of productivity of an individual (Dent, 2019). The idea of
being biased is an elaborated concept in terms of organizational justice and this would
comprise of more of the elements of the social structure according to which these
characteristics operate. At times, the idea or concept of organizational justice will only be
visible and appropriate when there is any occurrence of violation of justice takes place.
unequal pay for the men and women in terms of the same kind of job, performance
review being done by someone whom the employees know a little about, the
of the employees in an unpredictable manner (Fellenz and Martin, 2020). For these and
interactional.
19
The concept of distributive justice defines the results of being able to distribute
the inputs of an organization proportionally as per the principle of equity. The results of a
particular job may take the figure of issues related to wages, security of the job,
opportunities for the promotion and career enhancement, whereas the inputs in an
effort.
the employees often tend to make a judgment in relative terms, trying to look forth for a
relation between contribution and outcome which is like that of their subordinates or
colleagues. The principle of equity has already been upheld in terms of organizational
functionality to a very large extent by the standards meant for HR Assignment policies,
such as pre-established job grades and salary structures, training programs and
But still there might be some situations where an employee might get the feeling
that there has been an occurrence of unfair distribution of the benefits, for example, an
employee and his or her colleague have the same number of years’ service, but the
colleague is promoted whereas the employee, who deserved it, is not promoted. This is
quite clear that such decisions taken by the management are based upon the patterns of
considerations apart from the years of service done. However, these patterns or aspects of
decision taking will never be visible to someone outside the organization. The employee
who did not received the deserved promotion might consider that even though his or her
20
job role was the same in comparison to his or her colleague’s, but still they were
rewarded differently (2020). As a result of this thinking, such employees can ask for
being addressed to in terms of this perceived inequity either by reducing their workload,
or by simply being given compensation in the same degree as their colleague. Either way
decision-making process, that leads to a certain result. It was noticed that the idea of
procedural justice can outdo the idea of distributive justice, according to which people
might be willing to accept an unwanted outcome if they are made to believe that the
decision taken that lead to that particular outcome, was taken, following the principles of
organizational justice. Let’s take an example, people who smoke tend to strongly accept a
smoking ban at the workplace if they feel that they have been given a thorough
information regarding the ban imposed in a proper and organized manner (Silvester et al.
2019).
The concept of the interactional justice comes under the terminology and concept
concept in its own way. This concept pinpoints the quality of the type of treatment
received by the employees working in an organization, and the effects of the formal
decision-making procedures. There are many experts who have had identified some of
the key aspects of interactional justice, which can provide an alteration to the perceptions
procedural and interactional justice bears fruits for both the employees as well as the
organization; the former being satisfied of receiving fair treatment whereas the latter will
be able to maintain control and prevent any sort of challenge or threat from the
employees along with enjoying the benefits of being an employer. The profits that may
be earned by the employers and the employees can be seen in various areas such as equal
pay, improved performance of the employees, equal treatment being given, and many
towards job satisfaction, commitment, and trust, along with developing a healthy,
behavior’. According to this term, any sort of informal or social act that goes outside the
several various ways with variation in the impact upon the organization. At times, there is
a desire for naming and blaming a particular person or system and put the entire fault
upon it. It is very common to notice a single person or a group that comes under this
attack, and the employees may not feel inclined or qualified to question underlying
When a situation regarding any injustice arises, the managers would try to
channelize the responses of the employees into a particular area where such situations can
be effectively and properly dealt. The organisations will be able to provide benefit for
most of the employees who had have reacted to the injustice in an active and positive
manner. These employees will ensure that the injustice which has occurred is brought to
the notice of the management, which would enable the organization to go through its
practices and craft plans and policies for preventing any further problem.
Apart from the above-mentioned category of employees, there are also employees
responding in a negative manner and such employees are harmful for any organization.
The reason being they leave the issue in an unresolved state and decrease their
The idea of loyalty in behaviour is only ‘positive’ as far as it doesn’t pose any
immediate challenge or threat to the organisational behaviour. This kind of response will
never address the actual cause of the problem lying beneath and would only pile up the
resentment against future events of a similar nature (Pool, 2019). Below is the theoretical
PROCEDURAL
JUSTICE
Conceptual Framework
In the security planning process, the organization identifies which assets require
protection and the types of risks that could compromise those assets. This critical
function determines the level of appropriate countermeasure that is required based upon a
formally documented process. Human resources are usually the most critical asset within
any organization, and as such, must receive a stronger consideration when assessing risk.
Physical property or intellectual assets and legal risks can also affect people and
property, but need to be considered as a separate category. This is due, in part, to the
such occurrences and the impact on the organization if loss should ever occur. These
steps are critical to determine how to best protect organizational assets and must be
performed periodically. An added benefit of the security planning process is the potential
On the other hand, Peterson and Deal (2021) concluded that the influence of
culture is interrelated with everything that happens in school when they state, “Culture
influences everything that goes on in schools: how staff dress, what they talk about, their
willingness to change, the practice of instruction, and the emphasis given student and
faculty learning” . They further said, “This set of informal expectations and values shapes
how people think, feel, and act in schools. This highly enduring web of influence binds
the school together and makes it special”. If school culture is strong enough to bind a
25
school together and make it special, we must consider how school culture is both
established and changed. It appears that school culture is established in some schools
when they are built and evolves over time to its current state.
According to Adami & Norton (2020), the administrators and teachers must
important since schools have managed to change the culture of their schools using. Below
This study identified the security preparedness and amenities that are utilize ain
Bicol College. This includesthe situation of physical security based on the survey along:
Perimeter barriers; Guard force and guard system; Personnel Identification and Control;
Protective lighting; Alarm and communication system; Restricted areas; and Utilities,
describe personnel security along document and information security, etermine the
Others, such as supervision, bargaining agreement, and unfair labor practice were
School Administrators. They are leading the schools who will utilize the
findings of the study to empower the faculty to enhance performance towards security
management.
make and apply changes during their planning of curriculum guides that will be
addressed in this study. Further, the result of this study can be used to enhance the
curriculum.
28
in accord with the policies and regulations set forth by the local government unit or
Parents. They will be given assurance that their children will learn a lot in school
and that their teachers will help and teach to the best of their abilities for the benefit of
their sons/daughters.
Future Researchers. The study will serve as reference to any similar future
studies.
Definition of Terms
For this study, the following terms were conceptually and operationally defined
Realistic Work Expectations are the presumptive result from the various task
and use as platform to set mission and goals in achieving excellent work.
Such administration activities include setting the organization's strategy and coordinating
the efforts of staff to accomplish these objectives through the application of available
resources.
whether the training is implemented as per the action plan or whether there is any
employees do and why they do it. A procedure is the instructions on how a policy is
followed
Result-based are statements that illustrate substantial and important learning that
learners have achieved and can consistently demonstrate at the end of a course or
program. In other words, learning outcomes identify what the learner will know and be
"doing" and stepping back from the task and evaluating what has been done and
experienced. At this stage, lots of questions are asked and communication channels are
METHODOLOGY
Research Design
conducted. It is the strategic framework for the study and determines the kind of study
Qualitative research methods are designed in a manner that helps reveal the
behavior and perception of a target audience regarding a particular topic. There are
various types of qualitative research methods like an in-depth interview, focus groups,
ethnographic research, content analysis, case study research that are usually used. The
results of qualitative methods are more descriptive, and therefore the interferences are
It came from direct observation and in-depth analysis of the interviews among
respondents of the study. The results will be analyzed as part of the quantitative analysis.
Conducting in-depth interviews is one of the most common qualitative research methods.
It is a personal interview that is carried out with one respondent at a time. This is purely a
conversational method and invites opportunities to get details in depth from the
respondent.
More so, one of the advantages of this method provides a great opportunity to
gather precise data about what people believe and what their motivations are. Researchers
31
will ask questions that will help to collect meaningful data and proceed by asking follow-
These interviews can be done face-to-face or on phone and normally can last
between half an hour to two hours or even more. When the in-depth interview is
conducted face to face it gives a better opportunity to read the body language of the
Research Instrument
The researcher used survey form to identify the security preparedness and
three (3) for suggestions and refinement of the different items. The jurors were composed
of three (3) members who had background in the field of research. After which, the
researcher made a final draft of the questionnaire, and this was administered by the
Then, the results were determined, colated and analyzed. The core objective of
doing the pilot testing was to validate the items and the concepts that were included in the
questionnaire.
The researcher sought permission from the President of Bicol College to conduct
the said undertaking. After approval, a letter was also sent for the conduct of the study.
32
gather additional data and to validate and analyze the data gathered.
Bicol College was the respondent-school of this study. The answer to the security
survey was source in formulating the objectives, content, and performance standards.
The respondent-school served as the key respondent of the situdy. The answers to
the security survey and responses in an interview was gauged identify relevant
The subject of the survey was Bicol College, a non-stock and non-profit educational
institution located at Cor. J.P. Rizal and R.F Tabuena St., Daraga, Albay. It was
composed of 2 buildings with 97 of which are employees in the faculty, 51 employees for
non-teaching and 2557 are students from basic education, secondary, tertiary, and
The data collected by the researchers underwent analysis to answer the problem
of the study. At the onset, this employed the qualitative research method. In its
Dewey and psychologist Abraham Maslow have argued that violence, disorder, and
threats to physical safety are antithetical to an environment where students can learn and
develop and where teachers can instruct effectively. However, several studies have also
shown that school safety is largely a by-product of strong positive relationships between
The subject of the survey was Bicol College, a non-stock and non-profit
educational institution located at Cor. J.P. Rizal and R.F Tabuena S. Daraga Albay. It is
composed of 2 buildings with 97 of which are employees in the faculty, 51 employees for
non-teaching and 2557 are students from basic education, secondary, tertiary, and
programs and non-degree or short-term technical courses, and a complete High School,
Elementary and Pre-school education. There were also trees outside and near the
The perimeter fences in front of the admin building measure approximately 7 feet
in height with top guard but without perimeter lighting installed. Perimeter fence along
the ST building measures more than the standard height. However, it has inadequate top
guard and there was a house built on the other side attached to the perimeter which can be
34
used as a route for illegal intrusion. The perimeter fence near the rest room has no top
At present, there are four (4) security personnel for twenty-four (24) hours
security operation; day shift comprises two (2) and two (2) for night shift operation
respectively. These include two (2) Post-in-Charge for day shift, two (2) Shift in-Charge
for Night Shift and one (1) Security Guard assigned at VIP Residence for night shift only.
control: a. All employees are issued company identification card with photos but many of
the old employees also have a very old ID; not strict in requiring employees to always
wear their ID; all students have identification card and are strictly required to always
wear their ID upon entering the school premises; visitors are required to present valid ID
upon entrance and issued with a visitor’s pass or ID; and entrance and exit of employees,
issues, the school neglected other important elements of its larger educational goals,
unique to and the unusual circumstances that were confronting the school. Schools as
complex organizations are driven by multiple and often competing goals. Since the
advent of zero-tolerance policies, schools across the country have adopted several costly
security measures and highly punitive discipline policies to ensure safety (or the
Positive perceptions of safety are not insignificant, as they are vital to upholding
the school’s moral authority to maintain order,as well as to students’ and teachers’
abilities to focus on academics. Below is the result of situation survey along protective
lighting, alarm and communication system, restricted areas utilities, personnel security,
PURPOSE:
The purpose of a Security Plan is to enhance and maintain the security of a
licensee’s operation by assessing a site for security risks, developing measures to address
security issues by incorporating current security programs and developing new ones if
necessary, and formalizing responses to and reporting procedures for security incidents.
A Security Plan also enables the licensee to:
a. See how various elements of a security program integrate;
b. Set out roles and responsibilities for the security program, thereby ensuring
tasks are assigned, understood, documented, tracked, and organized in a
consistent manner;
c. Identify partners and resources in enhancing and maintaining the security of
its operations; and
d. Adjust security preparations and operations in response to changing
circumstances.
GENERAL DESCRIPTION:
The Security Plan must address the following components and should include a
description of the licensee’s current security programs and associated measures. The plan
should also reference any related documents (i.e., plans, policies, procedures, etc.). These
will be described in detail in licensee information; assessment of security threats and how
they are addressed; procedures to respond to threats to the security of explosives; and
security incident reporting procedures.
RECOMMENDATION:
Although not required to be submitted with the Security Plan, a Key Control Plan
and a list of employees requiring screening approval letters is required under the
regulations and must be made available. Separate guidelines are available for developing
a Key Control Plan and for understanding requirements under the screening provisions of
the Regulations. It is recommended you include them as part of your Security Plan as
they form part of the overall explosives’ security program for your site.
C. RESTRICTED
AREAS
1. Installation of signage to Bicol College PHP 10, 000.00 For Implementation
warn unauthorized person
especially the students
from entering and
constructing fence or
enclosure of said generator
set.
2.Visible signage to warn Bicol College PHP 5, 000.00 For Implementation
unauthorized persons to
keep out from said
premises and put-up
structural barriers to
prevent illegal intrusion.
D. UTILITIES
38
RECOMMENDATIONS
The Safety and Security Officer first identifies the main threats, the vulnerability
limited. The Safety and Security Officer then adapts existing policies/procedures and
systematic approach. By standardizing the process, mistakes are less likely to occur, and
more accurate calculations can be made. In addition, one must document the process and
keep accurate written records of the recorded data. This allows for better-informed
security must be clear and ensure that informed decisions can be taken and implemented
as quickly as possible. The Safety and Security Officer should provide guidance for
39
initial safety and security procedures, and ensure they are followed until the Safety and
the school. Based on the conclusions, the researcher drawn the following: a. The need of
resource officers would help in the direction of students with natural disasters as well as
intruder type disasters; b. The administrators and faculty need to determine if armed
school personnel would lead to safer school environments.; c. The staffing issue of
monitoring properly all schools must be addressed if school safety is to flourish; d. There
should be indicated the installation of shatterproof glass in the entrances could delay an
intruder. They stated that delaying perpetrator entry to schools would allow responders to
arrive to minimize the disaster.; e. The installation of shatterproof glass would benefit
schools; f. There should be allocation for the improvement of existing safety plans.
Communication and practice of existing evacuation plans with first responders is a factor
on the overall outcome of school safety planning; h. After practicing for an intruder,
feedback from staff and community responders must be examined and shared for the
REFERENCES
40
Abell, N., Springer, D. W., & Kamata, A. (2019). Developing and validating rapid
Ahmed, I., Sultana, I., Paul, S. K., & Azeem, A. (2020). Employee performance
evaluation: a fuzzy approach. International Journal of Productivity and Performance
Management, 62(7), 718–734.
JONEL B. BANDAGOSA
2023
43
TABLE OF CONTENTS
TITLE PAGE
TABLE OF CONTENTS
INTRODUCTION
METHODOLOGY
Research Design 13
Research Instrument 14
Data Gathering Procedure 15
Respondents of the Study 16
Research Locale/Study Site 16
Data Analysis Plan 17
References 19
44
APPENDICES
45
APPENDIX A
Transmittal Letters
46
APPENDIX B
Table 1
Table 2
Table 3
Table 4
Protective Lighting
Table 5
Alarm and Communication System
Table 6
Restricted Areas
Table 7
Utilities
Table 8
Document and Information Security
Table 9
Emergency Planning