CHAPTER 1 To 4 Grammarian

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 35

1

CHAPTER 1

INTRODUCTION

Rationale

This study decided to conduct and establish knowledge of the proposed

on perception of investigations on effectiveness of national id in identifying

criminals and their acceptance specially those using the national id to identify the

crimes regulatory entities voluntarily detect, disclose, and correct environmental

violations.

New ID card systems are appearing in countries around the world, based

on biometrics and using searchable databases. High technology companies

promote these, governments seek them for administrative efficiency and post-

9/11 demands for ‘security’ provide a rationale for their introduction. The

surveillance issue is not so much the cards themselves but the national registries

that provide for processing the personal data. These foster a ‘culture of control’

whose reach expands geographically as identification measures are harmonized

and integrated across national borders. They also encourage less inclusive

notions of citizenship, and facilitate the sorting of desirable and ‘undesirable’

motilities, based on the criteria of identity management’. The social sorting

capacities of new IDs are underplayed, as are the implications for governance of

‘multiple function ID systems, with consequences for social justice (Lyon, 2007).

National ID cards are implemented for national security reasons.

Government officials can prevent individuals who are not supposed to be in a

certain area, such as individuals who have been deemed national security
2

threats, from performing certain actions such as flying. ID cards also help law

enforcement identify an individual who is a suspect of a crime, according to the

University of Miami. The ID cards can help individuals owning the card in a law

enforcement situation, since these individuals can show their ID cards to

demonstrate that they are in fact who they say they are. ID cards help combat

identity theft. If a country has universal standards for ID cards and is able to

prevent forgery of these cards, conducting identity theft can be more difficult

because the owner of the ID card can prove his identity. Many businesses

require that customers show their ID card when using a debit card or a credit

card. With state-issued identification cards, some states might not use the most

fail-safe measures against card forgery (Pearson, 2017).

An ID card system will lead to a slippery slope of surveillance and

monitoring of citizens a national ID card system wouldn't protect us from

terrorism, but it would create a system of internal passports that would

significantly diminish the freedom and privacy of law-abiding citizens. Once put in

place, it is exceedingly unlikely that such a system would be restricted to its

original purpose. The original Social Security Act contained strict prohibitions

against use of Social Security cards for unrelated purposes, but those strictures

have been routinely ignored and steadily abandoned over the past 50 years. A

national ID system would threaten the privacy that Americans have always

enjoyed and gradually increase the control that government and business wields

over citizens (Stanley and Steinhardt, 2001).


3

Research Objective

This study would like to determine the common perception of PNP in

General Santos City to the Effectiveness of national ID System in Identifying the

criminals.

Specifically, it sought answer the following:

1. To determine the common perception of the PNP towards the

Effectiveness in using National ID System in identifying the criminals.

Review of Related Literature

Although the terrorist attacks of September 11, 2001 were not the first

against the United States, they did have a significant impact on how people

viewed their priorities and concerns for both public and personal security. Since

2001, computer hacking tools had become more effective and efficient, fraud

became more common, the number of reported cases of identity theft had

increased, and the wholesale information theft of credit card numbers were

occurring with greater frequency which were all contributing factors leading up to

the emphasis for increased security measures (Schneier, 2004).

Incorporating biometric technology within a security application was

inevitable because it uses an individual’s psychological or behavioral

characteristics as the basis for authentication. For example, biometric fingerprint

technology has been extensively used in forensics, criminal identification, and

prison security because the possibility that two people having the same

fingerprint has been calculated to be one in 64 billion (Chirillo and Blaul, 2003).
4

The first biometric fingerprint device was installed in 1972 on Wall Street, N.Y. as

a fingerprint measurement device. (Muller (2010)

Biometric security technology provides both enhanced security and

convenience over the traditional methods of access technology because

biometric data is difficult to steal, copy, or compromise (Jefferson, 2010).

Biometric identification is a method used for the authentication of an individual

based on the measurements of the individual’s physical features or behavioral

characteristics, where the features or characteristics are both unique to that

individual and are measurable (Okumbor&Chiemeke, 2011). Suggested that the

social acceptance of biometric technology conversely relates to its reliability.

(Ogini, 2013)

Usability factors along with user acceptances have become important

consideration in product development whereas previously the focus of suppliers

towards biometric devices has been on the implementation and security

algorithms.(Saavedra, Moreno, Antonio, and Reillo2010)

The business model of many organizations, such as Facebook, depends

on the collection of freely offered personal information (Adjei, 2013).

Acknowledged that Facebook implemented a new feature that members

perceived as a violation of their privacy, once they had reached 500 million users

in 2010.(Rosen, 2011) The Facebook management team believed that by

providing RSS news feed to a member’s network, broadcasting any updates

made to their profile would be a welcomed feature by enhancing information

sharing (Carey &Burkell, 2009).


5

However, even though the information was publically available, members

perceived the added feature as a violation of their privacy since the information

sent would go to their entire network and not just a select few. Another feature

introduced where privacy was questionable was with the added ability to view live

feeds from cameras having a publically accessible IP address (Rosen, 2011).

They developed a model to understand the relationship between the

constructs perceived need for privacy and perceived need for security.

Furthermore, the researchers developed a vignette based survey design to

“measure an individual’s perceived need for privacy in a general context (James

et al., 2006, p. 10). By using vignettes, the model was applicable across various

biometric devices. This study was based on the same instrument developed by

James et al. because it had proven to be highly reliable and a good predictor of

biometric adoption. The researcher of this study further extended the model to

investigate if individual differences would influence the perception and usage of

biometric technology. It is this researcher’s belief that the addition of individual

differences to the model would provide insight to the factors limiting acceptance

of biometric security devices (James et al. 2006)

Within the last decade, crime victims and others have begun to ask

whether crime reporting is actually victimizing the victims again. The issue is not

only what newspapers and electronic media can do legally, but also what they

ought to do ethically. The victims' movement does not want to curtail the

rights of the media, deprive them of the protections and privileges, or interfere

with the accomplishment of their mission. What the victims' movement wants is


6

more responsibility, sensitivity, restraint, and compassion on the part of the

media, who are currently known for sensationalism, exploitation, and callousness

toward grieving and suffering people. On the courts' part, the victims' movement

expects a more balanced approach to the protection both of the rights of the

press under the First Amendment and of those of the victims whose emotional,

mental and physical well-being may be placed in serious jeopardy by the mass

media is disclosure of their identity. (Viano, 1995)

Electroencephalogram (EEG) devices are undergoing a significant

evolution that is leading to their acceptance by an increasing number of users.

They provide a unique approach for interacting with a growing number of

applications (Minnery and Fine, 2009).

Biometric technologies have become the main focus in the design of state-

of-the-art border security solutions. While respective research in the field of

multimedia vision has been centeredon improving quality and accuracy of identity

recognition, the impact of such technologies upon society and legal regulations

still remains a topic unaddressed, specifically within the engineering community.

Research in technology can and in some respect must include collaboration with

social sciences and social practice. Building on participation in the EU funded

research project person(Privacy, Ethical, Regulatory and Social No-gate crossing

point solutions Acceptance), authors of this paper look at the challenges

associated with biometrics-based solutions in no-gate border crossing point

scenarios. This included the procedures needed for the assessment

of their social, ethical, privacy and regulatory acceptance, particularly in view of


7

the impact on both, the passengers and border control authorities as well as the

potential pitfalls of biometric technology due to fraudulent

activities. In consultation with the collaborating border control authorities, the

paper reports on the formal assessment of biometric technologies for real-

world acceptance to cope with the increasing demand of global travelers crossing

state borders.(Binder, Susanne, Iannone, Andrea and Chad, 2020)

In DNA profiling and data basing, laboratories directly compare DNA

profiles obtained from biological materials left at crime scenes with those taken

from individuals already charged with involvement in specific serious criminal

offences under investigation. However, the subsequent ability to construct digital

representation of profiles and store them in continuous searchable computerized

databases has made possible a vastly expanded role for DNA profiling in many

criminal investigations. In particular, this technology is increasingly applied

inceptively rather than reactively. In other words, it shapes an inquiry by

identifying potential suspects from the start rather than merely supporting their

incrimination or exoneration after they have been nominated for attention by

other more traditional, and often very protracted, forms of investigative practice

(Roberts, Taupin and Raymond, 2015).

Computerized ID scanning technologies have permeated many urban

night-time economies in Australia, the United States, Canada and the United

Kingdom. This paper documents how one media organization is overt and tacit

approval of ID scanners helped to normalize this form of surveillance as a

precondition of entry into most licensed venues in the Australian city of Geelong.


8

After outlining how processes of governance from above and from below

interweave to generate distinct political and media demands for strategies to

prevent localized crime problems, a chronological reconstruction of media reports

over a three and a half year period demonstrates how ID scanning became the

centerpiece of a holistic reform strategy to combat alcohol-related violence in this

nightclub precinct. Several discursive techniques helped to normalize this

technological fix while suppressing critical discussion of viable concerns over

information privacy, data security and system networking. The

implications of these reporting practices are discussed in light of the media's

central role in reforming the Geelong night-time economy and broader

trends in using novel surveillance technologies to combat urban crime problems

at the expense of alternative measures that protect individual liberty

(Warren, Miller, and Peter, 2012).

The thousands of serious cyber-attacks occurring daily highlight the critical

need for a workforce with the requisite skill set and of sufficient size to meet

growing and increasingly complex demands. Yet despite significant investments

in the development of the cyber security workforce from governments across the

globe, the US and many other nations lack a sufficient supply of well-trained

cyber security professionals. It is often argued that this workforce shortage, and

the consequent openness to attack, is a pressing security threat facing the US.

Professionalization activities such as certification, licensure, and skill-based

competency exams has been advanced as a strategy for creating a workforce

capable of addressing the growing cyber security threat. Activities by the US


9

federal government and other entities to professionalize cyber security should be

undertaken only when the occupations and specific occupational characteristics

have been defined, when there are observed deficiencies in the occupational

workforce that professionalization could help remedy, and when the benefits of

those activities outweigh the costs. (Burley, Diana L, Eisenberg, Jon, Goodman

and Seymour E. 2014).

Theoretical Framework

According to Zhen and Han (2014) national identity is the product of

the development of modern nationalism. Since we are in modern nationalism is

not only an ideology but also a political and social movement based on this

ideology. The most direct political product of modern nationalism is the nation-

state. Any modern nation-state includes two important aspects. One is the

nation-state system and the other is the national identity of the inhabitants in the

territory of the state. Cultural identity as a manifestation of social attributes of

human beings is also an important medium affecting the identity of individuals

and ethnic groups and national identity.

Significance of the Study

The purpose of this study and its results or findings of the study will bear

significant contributions to the following persons:

To the Researchers. This will serve as a way for other researchers to

contribute significantly to the development of our knowledge to possess these

features of the work and to improve the reader's understanding of how to


10

interpret the reader about the Perception of Investigations on Effectiveness of

National ID in identifying criminals in minimizing and searching the criminals.

To the Readers. To open the readers awareness and initiatives about

perception of investigations on effectiveness of National id in identifying criminals

and their acceptance.

To the Barangay Official. It will provide them idea on how the perception

of investigation on effectiveness of using National ID in identifying criminals will

deep the law or authorities in responding to criminals.

To the Residents. This research would give them how to secure their

lives against crime and to determine the use of National ID in solving cases

committed by criminals.

Definition of Terms

The keys terms used in this study is defined conceptually and to

understand better this research work.

PNP’s Perception on Effectiveness of using National ID – these refers to

the idea or insights of the Police Personnel in General Santos City on the

effectiveness of National ID in tracing criminals.


11

CHAPTER 2

METHOD

This chapter presents the research design, research locale data gathering

instruments, data gathering procedure, sampling technique, statistical instrument

and respondent of the study.

Research Design

The descriptive method of research was used for this study. The purpose

of descriptive study is to contain a precise profile data of the people, event or

situation. Since this study investigate and only Perception of PNP on

Effectiveness of using National ID in tracing criminals, this method is fit to use.

Research Locale

The researchers conducted this study in Barangay North located at

Lanzones Street, Dadiangas North, General Santos City. The researcher chose

Barangay North as their research locale because they are living in it.

Population and Sample

This study used random sampling, wherein in employing the respondents

PNP members were involved in this study who were randomly selected. PNP

members designated in different Police Stations in General Santos City.

Research Instrument

The instrument used in this study was survey questionnaire made by the

researchers as a tool obtaining concrete answers from the respondents. For its

validation, it was checked first by the adviser and then the validators who

checked in accuracy instruments.


12

Data Collection

The researchers used employed a step by step procedure in conducting

this study. The observed the proper protocols. First, they asked permission from

the PNP Chief for conduct of the study. Then after which was the distribution of

questionnaire and retrieval.

Statistical Tools

In treating the data gathered, the researchers used frequency count and

weighted mean to determine the respondents. Common perceptions and PNP

refers towards the use of National ID in tracing criminals.

Ethical Consideration

The researchers respected the rights of the respondents and the dignity of

the respondents and their priorities. The respondents were informed of the

content of Perception of Investigations on Effectiveness of National ID in

Identifying Criminals and their Acceptance.

.
13

Chapter 3

RESULTS

This chapter presents were the analysis of findings of the data gathered

from the research instruments used to determine the perception of the

respondents on the National ID System in identifying criminals.

Table 1

INDICATORS MEAN DESCRIPTION


1. National ID helps to reduce time in solving Agree
investigator crime. 4.08
2. National ID is more accurate and specific in Agree
solving crimes. 3.93
3. It is faster and easier way to identify criminals Agree
using National ID 4.02
4. National ID is an advance way to solve a Agree
crime. 3.99
5. National ID is specific and reliable in using for Agree
investigation. 4.11
6. National ID helps lessen in miss the crimes Agree
3.93
7. National ID help the investigator to know the Agree
background of the suspects. 4.04
8. National ID helps and supports the Agree
investigation. 4.09
9. National ID help reduce the law violators. 3.91 Agree
10. It is safe use the National ID in identifying Agree
crimes. 4.03
Composite Mean 4.01 Agree
Perception of PNP on the of National ID System in Identifying Criminals

Table 1 shows the perceptions of PNP in the use of National ID system in

identifying criminals. Among the ten indicators, the one that garnered the highest

mean score of 4.11 states that the respondents agree that the National ID is

specific and reliable in using for investigation.


14

Aside from the abovementioned indicator, the respondents also agree on

the following are the indicators National ID helps and supports the investigation

with mean score of 4.09, it helps to reduce time in solving investigator crime with

mean score of 4.08, help the investigator to know the background of the suspects

with mean score 4.04, it is safe to use in identifying crimes with mean score of

4.03, and lastly, it is faster and easier to identify criminals using National ID with

mean score of 4.02.

Furthermore, it can be seen that the respondent’s perception of

investigations is positive as they agree that the National ID system helps in

identifying criminals as it got a composite mean of 4.01.


15

Chapter 4

DISCUSSION

This chapter presents the summary of the research work undertaken, the

conclusions drawn, and the recommendations made as an outgrowth of this

study.

Conclusions

Based on the results of the study, the following conclusions were drawn:

1. The researchers concluded that the respondent’s perception on the use of

the National ID system in identifying criminals is positive. This means that

it could help the law enforcers to easily trace criminals or law offenders.

Recommendations

Based on the findings and conclusions of the study, the following

recommendations are presented:

1. Authorities may implement the National ID system encouraging any

Filipino to get this ID for use more efficient monitoring of census and in

helping law enforcers to easily trace those law violators.

2. National ID System must accessible to all law enforcement agencies

which serve as additional sources of information retain.

3. Strengthen the implementation of Nation ID for this is very helpful in

expediting solution.
16

REFERENCES

Arnson, Aaron. (2012) Implicit Balancing in the Adjudication of Criminal Law


retrieved September 9 2021 from
https://www.proquest.com/docview/1143509129/abstract/107D451CD69480
8PQ/1?accountid=37719
Bambauer, D. E. (2013, January 29). Privacy versus security: Journal of criminal
law and criminology, forthcoming; Arizona legal studies discussion paper no.
13-06. Retrieved April 7, 2013, from http://ssrn.com/abstract=2208824
Binder, Susanne; Iannone, Andrea; Leibner Chad. (2020)  Biometric technology
in “no-gate border crossing solutions” under consideration of privacy, ethical,
regulatory and social acceptance retrieved December 29 2020 from
https://www.proquest.com/docview/2548026762/15FBF14E37034D9BPQ/31?
accountid=37719
Bitonti, Ann Marie. (2014) Assessing the relationship between demographic
attributes with the acceptance of biometric security devices retrieved July
2014 from
https://www.proquest.com/docview/1614191134/fulltextPDF/78C524BBEF2E
4057PQ/1?accountid=37719
Burley, Diana L; Eisenberg, Jon; Goodman, Seymour E. (2014) Privacy and
Security: Would Cybersecurity Professionalization Help Address the
Cybersecurity Crisis retrieved February 2014 from
https://www.proquest.com/docview/1505016967/2205F59F702E40C1PQ/27?
accountid=37719
Byrne J. and Marx G. (2011) Technological Innovations in Crime Prevention and
Policing. A Review of the Research on Implementation and Impact retrieved
2011-3, nr. 20 p. 17-40 from https://www.ojp.gov/pdffiles1/nij/238011.pdf
Liu Q. and Turner D. (2018) Identity and national identity retrieved February 19,
2018 from
https://www.tandfonline.com/doi/full/10.1080/00131857.2018.1434076
Lyon D.(2007) National ID Cards: Crime-Control, Citizenship and Social
Sortingretrieved January 2007 from
https://www.researchgate.net/publication/239543744_National_ID_Cards_Cri
me-Control_Citizenship_and_Social_Sorting.
Pearson C. (2017) The Advantages of National ID Cards retrieved September
26, 2017 https://legalbeagle.com/13635764-can-homeless-people-obtain-a-
drivers-license.html
Rodriguez, Ricardo J. (2015) An Electroencephalogram (EEG) Based Biometrics
Investigation for Authentication: A Human-Computer Interaction (HCI)
Approach retrieved August 5, 2021 from
https://www.proquest.com/docview/1720264091/abstract/4D066B3B12DF47D
CPQ/1?accountid=37719
Stanley J. and Steinhardt B.(2001) Five reasons why national ID cards are a bad
idea retrieved November 29, 2001 from
https://www.computerworld.com/article/2583871/five-reasons-why-national-
id-cards-are-a-bad-idea.html
17

Ucheawaji Nathaniel Nte; Ngboawaji Daniel Nte; Bribena, Kelvin


Enokie; Bienose, Onyeka. (2019) DNA Profiling and the Challenges of Crime
Management in Nigeria: The Case of The Nigeria Police Force retrieved
November 3, 2019 from
https://www.proquest.com/docview/2447001622/abstract/BBD56A6E181E49
E6PQ/1?accountid=37719
Viano E. (1995) Victims, crime and the media: Competing interests in the
electronic society retrieved December 9 2021 from
https://www.proquest.com/docview/211285830/FF3C220EF4974AC3PQ/83?
accountid=37719
18

APPENDICES
19

Appendix A
RAMON MAGSAYSAY MEMORIAL COLLEGES
Pioneer Avenue, General Santos City

Letter for Validators

February 23, 2022


Sir/Ma’am:
Magandang Gensan!

We are a criminology students from Ramon Magsaysay Memorial Colleges is


conducting thesis entitled "PERCEPTION OF INVESTIGATION ON
EFFECTIVENESS OF NATIONAL ID IN IDENTIFYING CRIMINALS AND
THEIR ACCEPTANCE’’.

In this regard we are asking your expertise to validate our survey questionnaire
which will be used in generating the relevant data of the study. Your suggestions
and recommendation are very important to measure thoroughly the variable
under study.

Thank you so much and God bless.

Very yours

RYAN JAY HERCEDA and ARIEL GLENN BARLECONA


Researcher

Noted by:

ROVI GRACE LIMOS, MSCJ


Adviser
20

Appendix B

VALIDATION SHEET

To the Validator:
Please check the appropriate box for your ratings using the following
validation scale:
5 – Excellent 1 – Poor
4 – Very Good 2 – Fair
3 – Good
Items 5 4 3 2 1

1. Clarify of directions and items.


The vocabulary level, language structure and
conceptual level of respondents. The test directions
and items written in clear and understandable manner.
2. Presentation/Organization of items.
The items are presented and organized in logical
manner.
3. Suitability of items.
The manner of items appropriately represented the
substance of the research. The questions are
designed to determined the conditions, knowledge,
perception and attitudes that are supposed to be
measured.
4. Adequateness items per category.
The items represent the coverage of the research and
equality. The number of question per area is
respectively enough of the question needed of the
research.
5. Attainment of the purpose.
The instrument as a whole fulfills the objectives of
which was constructed.
6. Objectivity
Each item question requires only specific answer or
measures only behavior and no aspect of the
questionnaire suggests bias of the researcher.
7. Scale and evaluation rating system.
Scale adapted is appropriate for items.

Overall Remarks:

Date validated: _________________


_______________________________
(Signature above Name of Validator)
21

Appendix C

SURVEY QUESTIONAIRE ON

Perception of investigations on effectiveness of national id in identifying


criminal and their acceptance.

Name: (Optional) : Date:

Direction: Kindly checked the box that will correspond to your answer as to your
Perception of investigations on effectiveness of national id in identifying criminals
and their acceptance.

Legend Description
5 Strongly Agree
4  Agree
3 Neither Agree nor Disagree
2 Disagree
1 Strongly Disagree

Part l. Perception of Investigation of National ID System in identifying criminals.


  5 4 3 2 1
1. National ID helps to reduce time in
solving investigator crime.          
2. National ID is more accurate and
specific in solving crimes.          
3. It is faster and easier way to identify
criminals using National ID          
4. National ID is an advance way to solve  
a crime.        
5. National ID is specific and reliable in  
using for investigation.
       
6. National ID helps lessen the crimes.  
       
7. National ID help the investigator to  
know the background of the suspects.        
8. National ID helps and supports the  
investigation.
       
9. National ID help reduce the law  
violators.        
22

Q10. It is safe use the National ID in  


identifying crimes.
       
23

Appendix D

SUMMARY OF VALIDATOR’S RATING


RAMON MAGSAYSAY MEMORIAL COLLEGES
CRIMINAL JUSTICE EDUCATION PROGRAM
Pioneer Avenue, 9500 General Santos City
Tel No. [085] 552-3348 Fax No. (083)301-1927

Summary of Validator’s Ratings on Questionnaire

Name of the Validators Average Description


Rating
1. Erolled T. Piloton 4.86 Excellent

2. Sheilla N. Cuaresma RCrim, 5.00 Excellent

3. Jona Marie Cariño 4.00 Very Good

Average Weighted Mean 4.62 Excellent

Legend:

3.50 – 5.00 Excellent

1.50 – 4.49 Very Good

2.50 – 3.49 Good

1.50 – 2.49 Fair

1.00 – 1.49 Poor


24

Appendix F

LETTER OF REQUEST TO CONDUCT STUDY


RAMON MAGSAYSAY MEMORIAL COLLEGES
CRIMINAL JUSTICE EDUCATION PROGRAM
Pioneer Avenue, 9500 General Santos City
Tel No. [085] 552-3348 Fax No. (083)301-1927
www.rmmc.edu.com

GERALDINE E. RODRIGUEZ, EdD


Executive Director for Academic Affairs
Ramon Magsaysay Memorial Colleges
General Santos City

Dear Ma’am,

Greetings of Peace!

We are a 4th year student of Ramon Magsaysay Memorial College taking


up a degree of Bachelor of Science in Criminology and we will be going to
conduct a thesis study entitled “PERCEPTION OF INVESTIGATION ON
EFFECTIVENESS OF NATIONAL ID IN IDENTIFYING CRIMINALS AND
THEIR ACCEPTANCE’’ in partial fulfillment of the requirement in Criminological
Research 1.

In this connection we researchers are humbly requesting permission to


conduct the study. Rest assured that all information that we will gather shall be
kept strictly confidential.

Your approval to conduct the study will be greatly appreciated. Thank you
and God bless.

Respectfully yours,

ARIEL GLENN S. BARCELONA


RYAN JAY M. HERCEDA
Researcher

Noted by:

MARNIE J. BESAS Ph.D


College of Criminal Justice Dean
25
26

Appendix

CERTIFICATE
RAMON MAGSAYSAY MEMORIAL COLLEGES
CRIMINAL JUSTICE EDUCATION PROGRAM
Pioneer Avenue, 9500 General Santos City
Tel No. [085] 552-3348 Fax No. (083)301-1927
www.rmmc.edu.com

CERTIFICATION

TO WHOM IT MAY CONCERN;

This is to certify that the undersigned did the Statistics of the


undergraduate thesis of ARIEL GLENN S. BARCELONA and RYAN JAY M.
HERCEDA entitled “PERCEPTION OF INVESTIGATION ON EFFECTIVENESS
OF NATIONAL ID IN IDENTIFYING CRIMINALS AND THEIR ACCEPTANCE’’
as to applying the appropriate statistical tools mechanisms and format for the
refinement and improvement.

This certification is granted upon the request of the above–named


subject(s) for any purposes related to the research

Issued this-day of May 2022 at Ramon Magsaysay Memorial Colleges


General Santos City.

CHRISTIAN JAY FAJARTIN

Statistician
27

Appendix K

CERTIFICATE (GRAMMARIAN)
RAMON MAGSAYSAY MEMORIAL COLLEGES
CRIMINAL JUSTICE EDUCATION PROGRAM
Pioneer Avenue, 9500 General Santos City
Tel No. [085] 552-3348 Fax No. (083)301-1927
www.rmmc.edu.com

G R A M M A R I A N’ S C E R T I F I C A T E

This is to certify that the undersigned has reviewed and went through all
the pages of the proposed project study research entitled “PERCEPTION OF
INVESTIGATION ON EFFECTIVENESS OF NATIONAL ID IN IDENTIFYING
CRIMINALS AND THEIR ACCEPTANCE’’ as against the set of structural rules
that govern the composition of sentences phrases and words in the English
language.

Signed

Grammarian
28

Appendix L

PLAGIARISM CHECKER RESULT


RAMON MAGSAYSAY MEMORIAL COLLEGES
CRIMINAL JUSTICE EDUCATION PROGRAM
Pioneer Avenue, 9500 General Santos City
Tel No. [085] 552-3348 Fax No. (083)301-1927
www.rmmc.edu.com
29

Appendix M

CURRICULUM VITAE OF THE EXTERNAL


VALIDATOR
RAMON MAGSAYSAY MEMORIAL COLLEGES
CRIMINAL JUSTICE EDUCATION PROGRAM
Pioneer Avenue, 9500 General Santos City
Tel No. [085] 552-3348 Fax No. (083)301-1927
www.rmmc.edu.com

Name Qualification
Erolled T. Piloton License Professional Teacher

Sheilla N. Cuaresma CRim, Criminology Instructor

Jona Marie Cariño Barangay Sec. Dadaingas North,


General Santos City
30

SURVEY QUESTIONAIRE

Perception of investigations on effectiveness of national id in identifying criminal


and their acceptance.

Direction: Kindly checked the box that will correspond to your answer as to your
Perception of investigations on effectiveness of national id in identifying criminals

and their acceptance.

Legend Description

5 Strongly Agree

4  Agree

3 Neither Agree nor Disagree

2 Disagree

1 Strongly Disagree

Part l. Perception of Investigation of National ID System in identifying criminals.

  5 4 3 2 1
1. National ID helps to reduce time in
solving investigator crime.          
2. National ID is more accurate and specific
in solving crimes.          
3. It is faster and easier way to identify
criminals using National ID          
4. National ID is an advance way to solve a  
crime.        
5. National ID is specific and reliable in  
using for investigation.
       
6. National ID helps to lessen the crimes.  
       
7. National ID help the investigator to know  
the background of the suspects.        
31

8. National ID helps and supports the  


investigation.
       
9. National ID help reduce the law violators.  
       
Q10. It is safe use the National ID in  
identifying crimes.
       
32

CURRICULUM VITAE

RYAN JAY M. HERCEDA

General Santos City

Email:

Personal Data

Course : Bachelor of Science in Criminology

Age : 25 years old

Sex : Male

Date of Birth : February 14, 1996

City Address : General Santos City

Religion : Roman Catholic

Civil Status : Single

Father’s Name : Ronelo M. Herceda.

Mother’s Name : Lorraine M. Herceda

Language Spoken : English, Tagalog and Cebuano

EDUCATIONAL BACKGROUND

Tertiary

Bachelor of Science in Criminology

Ramon Magsaysay Memorial Colleges

Pioneer Avenue, General Santos City

SY: 2021- 2022


33

Secondary

Dadiangas North High School

SY: 2014-2015

Primary

Speed Integrated School

SY: 2007-2008
34

ARIEL GLENN S. BARCELONA

Baliton, GlanSarangani Province

Email:

Personal Data

Course : Bachelor of Science in Criminology

Age : 29 years old

Sex : Male

Date of Birth : April 5, 1992

City Address : Sarangani Province

Religion : Roman Catholic

Civil Status : Married

Father’s Name : Felipe T. Barcelona.

Mother’s Name : Mely S. Barcelona

Language Spoken : English, Tagalog and Cebuano

EDUCATIONAL BACKGROUND

Tertiary

Bachelor of Science in Criminology

Ramon Magsaysay Memorial Colleges

Pioneer Avenue, General Santos City

SY: 2021- 2022


35

Secondary

Baliton National High School

SY: 2010 - 2011

Primary

Baliton Elementary School

SY: 2005 - 2006

You might also like