Final Research
Final Research
Final Research
References:
Johnson, R. (2018). Campus Security: The Growing Need for Advanced Safety
Measures. Journal of Educational Safety, 23(2), 145-161.
Alghamdi, S. (2020). Technology and Security in Schools: The Role of CCTV and
Biometric Systems. Journal of Technological Innovations in Education, 12(3), 67-89.
Carter, M., & Bowers, P. (2019). Human Factors in Academic Security: The Role of
Training and Compliance. International Journal of Educational Management, 35(4),
289-305.
Murphy, K. (2021). Designing Safe Learning Spaces: Physical Infrastructure and
Security in Schools. Journal of Architecture and Safety, 9(1), 34-50.
Duncan, L. (2022). Mental Health, Social Support, and Violence Prevention in
Academic Institutions. Educational Psychology Review, 42(3), 213-225.
•The study aims to assess the effectiveness of the current practices, enhance the
Salette?
2. What are the key vulnerabilities and risks in the current security system of
University of La Salette?
3. How do students, staff, faculty and administrators perceive the adequacy and
Theoretical Conceptual
Theoretical Framework
The theoretical framework provides a structured lens for examining how various
security theories, practices, and safety principles interact to enhance or hinder
security in academic institutions. This framework integrates Crime Prevention
through Environmental Design (CPTED), Routine Activity Theory, Risk Management
Theory, and Safety Culture Theory. These theories guide the identification of security
gaps, evaluation of existing practices, and formulation of practical recommendations.
Conceptual Framework
Input: Process: Output:
Feedback
Figure 1. Paradigm of the study
METHODOLOGY
Research Design
Research approach
This research will use a descriptive research design with a mixed-
methods approach, combining both qualitative and quantitative methods. The
study aims to analyze and evaluate the effectiveness of campus security
measures and practices, as well as to identify areas for improvement. Data
will be collected through structured questionnaires, interviews, and direct
observations to ensure a comprehensive understanding of the campus
security landscape. Site and Participants The study will be conducted at
University of La Salette. This site was selected due to its diverse academic
environment and security infrastructure, which provide an excellent
opportunity to assess the effectiveness of existing security practices. The
participants for this study include: Students: Representing the primary
population affected by campus security. They will provide feedback on their
perceptions of safety and satisfaction with current security measures. Faculty
and Staff: Offering insights into how security measures impact the teaching
and working environment on campus. - Administrators: Providing information
on the development, policies, and implementation of security protocols within
the institution. - Security Personnel: Offering operational insights into the
challenges, practices, and effectiveness of campus security systems. This
diverse group of respondents ensures that the study captures a range of
perspectives, providing a holistic understanding of the campus security
situation.
In this study, the random sampling method is crucial because it allows for the
collection of diverse perspectives regarding campus security. Students, faculty,
and staff may have different experiences and perceptions of safety, which can
reveal gaps or strengths in the current security measures. The survey questions
will focus on:
Perceptions of safety and security on campus.
Satisfaction with the existing security protocols (e.g., surveillance
systems, security personnel, and access control).
Suggestions for improvement.
Methodology
a. Research Approach
Descriptive Research
seeks to provide an accurate portrayal of the "what," "where," "when," and "how" of
the subject under study. It is typically used when the goal is to gather information that
can later be analyzed to reveal patterns, trends, or potential areas for further
exploration.
analysis, and it can be both qualitative and quantitative in nature. The primary aim is
Descriptive research allows the study to map out and document the existing
describing:
The nature and frequency of security-related incidents that occur within the facilities.
•Instrument
structured way to answer research questions and achieve research objectives. The
choice of research instrument depends on the nature of the study, the type of data
more.
•Data Gathering Procedure
collect relevant information for the study on “Security Analysis of Academic Facilities:
Assessing Current Practices and Enhancing Safety Measures.” These steps ensure
that the process is organized, ethical, and efficient, leading to the collection of
Objective: To ensure that all aspects of the data collection process are organized
ensuring they align with the research questions and hypotheses. For example:
Develop the tools that will be used to collect data, such as:
interviews.
Focus Group Guidelines: Create discussion points for focus group sessions to
Ethical Approval: Obtain ethical approval from the institution’s ethics review
board (if applicable). This ensures that data collection adheres to ethical standards,
Sampling Plan: Define the target population (students, faculty, staff, security
sampling, stratified sampling) to ensure that data is representative and diverse. Set
clear inclusion and exclusion criteria (e.g., only students enrolled at the institution,
Objective: To prepare all necessary materials, secure permissions, and engage with
participants.
Use informed consent forms for interviews and focus groups, ensuring participants
understand the purpose of the study, the voluntary nature of participation, and their
right to confidentiality.
Pilot Testing: Pilot the instruments (surveys, interview guides, focus group
surveys, conduct interviews, and facilitate focus groups. They should understand the
Objective: To actively collect the required data from participants using the chosen
instruments.
A. Survey Administration
Monitoring Response Rates: Track the completion rate of the surveys and
submission.
Clarifying Questions: Set up a mechanism for participants to ask questions
about the survey (e.g., email support) in case they need clarification about any of the
questions.
B. Conducting Interviews
semi-structured interviews, ensuring that the setting is private and free from
distractions.
Conducting the Interview: Use a semi-structured format: start with the pre-
Record the interviews (with consent) either through audio recording or detailed note-
taking.
Ensure that each interview follows the ethical guidelines (e.g., voluntary participation,
confidentiality).
Ensure that any non-verbal cues or additional information are captured and
groups (e.g., students, faculty) and organize them into groups of 6-8 participants.
opinions openly.
Facilitating the Discussion: Introduce the focus group, explain its purpose,
Take detailed notes and, if appropriate, record the session (with consent).
Post-Focus Group Review: After the session, review the notes or recordings
D. Document Analysis
security policies, incident reports, and emergency response plans from academic
institutions.
confidential.
information about current security measures, effectiveness, and any potential gaps in
the system.
Use content analysis to categorize and analyze the data, looking for recurring
Objective: To ensure that all collected data is securely stored and organized for
analysis.
recordings/transcripts, focus group notes, and document analysis data into clearly
Ensure that all data is anonymized to protect participant identities, especially for
sensitive information.
Data Back-Up: Store digital data in secure locations (e.g., encrypted cloud
location.
Objective: To ensure that all data collection is complete, and the process is ready for
analysis.
Final Review: Ensure that data from all sources (surveys, interviews, focus
End of Data Collection: Confirm that the data collection phase is finished,
Data Analysis
Data analysis is a critical phase in the research process, where raw data is
will ensure that the collected information is accurately interpreted and applied to
Objective: To summarize and describe the basic features of the collected data, which
forms the basis for understanding the patterns, trends, and distributions within the
dataset.
questions (e.g., "Do you feel safe on campus? Yes/No"). This will provide an
Use standard deviation to measure the variability or spread of responses (e.g., how
analyze relationships between different variables, such as age group and perception
Thematic Analysis: Review interview and focus group transcripts, and code
responses to identify key themes related to security practices, safety concerns, and
security incidents.
qualitative data (e.g., participants repeatedly mention the lack of adequate lighting in
Ethical Consideration
ensuring that the rights, dignity, and well-being of participants are protected
throughout the research process. For the study on “Security Analysis of Academic
1. Informed Consent
research, the procedures involved, and their rights before agreeing to participate.
Clear Explanation: Provide participants with detailed information about the study’s
objectives, how the data will be used, and the potential benefits and risks involved.
Voluntary Participation: Make it clear that participation is entirely voluntary and that
Consent Forms: Obtain written or electronic consent from each participant. The
locked physical locations. Limit access to the data to authorized personnel only.
Data Handling: Clearly inform participants about how their data will be stored,
3. Right to Privacy
Sensitive Data: Avoid asking participants for information that is not directly
relevant to the research. If sensitive questions are necessary, ensure that they are
ensure that discussions are held in private settings to protect participants’ privacy.
Additionally, participants should be aware of any recordings (audio or video) that will
take place during these sessions, and consent must be obtained beforehand.
4. Avoiding Harm
Minimize Risk: Assess the potential risks of the study and take measures to
minimize them. For example, ensure that participants are not asked about highly
support services (e.g., counseling) in case they feel distressed by any aspect of the
study.
participants are given the opportunity to ask questions and clarify any aspects of the
study.
Objective: Ensure that all aspects of the research are conducted transparently
and honestly, both in the data collection process and in reporting the results.
Full Disclosure: Be transparent about the nature of the study, any potential conflicts
report findings accurately, even if they do not align with the study’s hypotheses or
expectations.
No Coercion: Avoid coercing participants to join the study, ensuring that they
Objective: Ensure that all participants are treated with respect and that the
(e.g., different genders, ethnicities, and roles within the academic institution) have
language and methods used in the study are culturally appropriate and respectful.
Avoid Bias: Avoid bias in participant selection and ensure that all voices and
perspectives are equally valued, especially when discussing sensitive issues like
campus safety.
Objective: To ensure that the findings of the study are presented accurately
Data Integrity: Analyze and report data without distortion. Ensure that the
analysis reflects the actual findings and does not overstate or misrepresent
conclusions.
presentations, or reports.
8. Ethical Review
Institutional Review Board (IRB) Approval: Submit the research proposal for review
by an Institutional Review Board or Ethics Committee to ensure that the study meets
ethical standards.
committee about the progress of the study and address any ethical concerns that