0% found this document useful (0 votes)
112 views25 pages

THS 102 - Module 2 Writing The Components of Chapter 1

This document discusses the requirements and guidelines for thesis writing and capstone projects for computing degree programs in the Philippines. It provides an overview of what constitutes a thesis and capstone project, as well as templates and guidelines for their structure and components. Thesis is defined as a research project while capstone projects involve designing a solution to address an existing problem. The document outlines the expected learning outcomes and provides discussion on writing an effective introduction and overview of the key components of a thesis or capstone project.

Uploaded by

Kabagis TV
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views25 pages

THS 102 - Module 2 Writing The Components of Chapter 1

This document discusses the requirements and guidelines for thesis writing and capstone projects for computing degree programs in the Philippines. It provides an overview of what constitutes a thesis and capstone project, as well as templates and guidelines for their structure and components. Thesis is defined as a research project while capstone projects involve designing a solution to address an existing problem. The document outlines the expected learning outcomes and provides discussion on writing an effective introduction and overview of the key components of a thesis or capstone project.

Uploaded by

Kabagis TV
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Republic of the Philippines

President Ramon Magsaysay State University


(formerly Ramon Magsaysay Technological University)
San Marcelino Campus
San Marcelino, Zambales

College/Department College of Communication and Information Technology


Course Code THS 102
Course Title CS Thesis Writing
Place of the Course on Major
the Program
Semester & Academic First Semester, AY 2021 – 2022
Year

Introduction
Degree Program Requirements
This section deals with the specific requirements mandated by the Commission on Higher
Education (CHED) for the different computing programs such as the Bachelor of Science in
Computer Science (BSCS) program; the Bachelor of Science in Information Technology (BSIT)
program; Bachelor of Science in Information System (BSIS) program and the Bachelor of Science
in Entertainment and Multimedia Computing (BSEMC) program.
In the BSCS program, which is a research-based program, thesis is a requirement. Here,
contents must be focused on the theories and concepts of computing and it should be in the form
of scientific work, which may be presented in a public forum. For the BSIT, BSEMC and BSIS
program, the requirement is a capstone project in form of a systems applications for BSIT or an
enterprise resources plan for BSIS program (CMO 53 s. 2006).
Both thesis a capstone project are considered courses that require a culminating activity
that generates an output useful in the development of solutions. Thesis is research activity while
capstone project involves design.
Intended Learning Outcomes
At the end of this module, the student is expected to:
- differentiate thesis against a capstone project
- be familiar with the different topic from which a good research problem and/or design
may be derived
- have a general overview on how to do a thesis and/or capstone project
- create a list of possible research or capstone project topics
- list all the necessary components of chapter 1 of a thesis or capstone project
- write a good introduction/project context/background of the problem
- formulate the statement of the problem and/or objectives of the study
- differentiate conceptual framework against a theoretical framework
Module 2 - Page 1 of 25
- demonstrate the significance of the study or the purpose and description of the
study/project
- explain and justify the limitations of the study
- write a good chapter 1 of a thesis or capstone project
Discussion
What is a Thesis?
A thesis may be defined as the report of scholar upon some piece of research which he has
completed. It is the culmination of a devious process extending from the initial into the
opportunity for investigation to the insertion of the final footnote (Cole and Bingelow, 1935). In
the area of computing, it is defined as a technical report on a systematic investigation of a problem
that can be solve using Computing. It may include a solution, an approximate or partial solution, a
scientific investigation, or the development of results leading to the solution, a scientific
investigation, or the development of results leading to the solution of the problem (Section 2.1,
Article II of Annex A of CMO 25 s. 2014).
Under OBE parlance, a capstone project is the design completed by a student, which results
in an optimum use of the resources demonstrating his competencies gained from his education
experiences.
The authors subscribe to the recommendation of the Philippine Society of Information
Technology Educators (PSITE) and Computing Society of the Philippines (CSP) in choosing topics
(but not limited to) for each program area which is similar to the sample Thesis / Capstone
guidelines issued by CHED contained in Annex A of CMP 25 series of 2015.
What is Capstone Project?
A Capstone Project is an undertaking appropriate to a professional field. It should
significantly address an existing problem or need. An Information Systems (IS) Capstone Project
focuses on business process and the implications of introducing a computing solution to a problem
while an Information Technology (IT) Capstone Project focuses on the infrastructure, application,
or process involved in implementing Computing solution to a problem (Section 2.2, Article II of
Annex A of CMO 25 s. 2015). Of course, for the BSEMC program the capstone project deals with
game development and digital animation Technology (Section 8.2.3 of CMO 25 series of 2015).
CHED’s Suggested Documentation Template/Format

CS Thesis (Foundation of Computer Science)


CS Thesis (Foundation of CS Thesis (Software IT/IS Capstone Project
Computer Science) Development)
− Title Page − Title Page − Title Page
− Abstract − Abstract or Executive − Executive Summary
− Table of Contents Summary − Table of Contents
− Table of Contents − List of Figures
− List of Tables
Module 2 - Page 2 of 25
− List of Figures, List of − List of Figures, List of − List of Notations
Tables, List of Tables
Notations − List of Notations
− Introduction − Introduction − Introduction
− Background of the − Project Context − Project Context
Problem − Purpose and − Purpose and
− Statement of the Description Description
Problem − Objectives − Objectives
− Objective of the Study − Scope and limitations − Scope and limitations
Significance
− Scope and Limitations
− Related Literatures − Related Literatures − Review of Related
Theoretical − Technical Background Literature/Systems
Background − Technical Background
− Proposed Solution to − Design and − Methodology
the Problem Methodology − Results and Discussion
− Requirement Analysis
− Requirements
− Documentation
− Design of Software
− Systems, Product
and/or Processes
− Development and
Testing, where
applicable
− Description of the
Prototype, where
applicable
− Implementation plan
(Infrastructure /
Deployment) where
needed
− Implementation
results, where
Applicable
− Result and Discussions − Results and Discussion −
− Conclusions and − Conclusions and − Recommendations
Recommendation Recommendation
− Appendices − Appendices − Appendices

Irrespective of the format you will be using, this reference will guide you how to effectively
write each of the components of your thesis or capstone project. Thus, it will be mandatory for
this textbook to discuss every component of the thesis or capstone project included in the above
template provided by CHED’s Technical Panel for IT Education. In addition, thereto, this text will
also discuss some thesis / capstone project components which were not included in the above
Module 2 - Page 3 of 25
template such as theoretical framework, conceptual framework, synthesis, among others. These
thesis / capstone project components may be adopted by schools and universities in the exercise
of its academic freedom.
Writing a Good Introduction
In formulating these guidelines, the author used as reference the work of Calmorin and
Calmorin (1995) as well as the works of Sevilla, Ochave, Punzalan, and Uriarte (1984) and made
the necessary modifications and amendments so that it will be fitted for computing students.
Guidelines in writing the introduction. A good introduction of an IT and IS capstone projects
should contain a discussion of all the following:
1. Presentation of the importance of the system software, algorithms, processes or an
enterprise resource plan to be designed and/or developed. “DEVELOPMENT AND
EVALUATION OF A DECISION SUPPORT SYSTEM FOR THE JIL CHURCH – CALAMBA CITY
USING TRANSACTION PROCESSING AS PERCEIVED BY ITS ADMINISTRATORS AND WORKERS
FOR THE YEAR 2015” the main objective of which is a development of an Information
System (IS) and/or a Decision Support System (DSS), part of the introduction reads in part:

Demo
Organizations have long recognized the importance of managing key resources such
as labor and raw materials. Information is not just a by-product of conducting business,
rather, it fuels business and can be the critical factor in determining the success or failure
of a business.
To maximize the usefulness of information, a business must manage it correctly,
just as it manages other resources. Managers need to understand that costs are associated
with the production, distribution, security, storage, and retrieval of information. The
strategic use of information for positioning a business competitively should not be taken for
granted.
The above title is a sample IT or IS Capstone project and strictly speaking is not for
the BSCS program. Of course, the Dean, in the exercise of his/her discretion, may accept
as thesis, a project which should be considered as a capstone project only, considering the
difficulty of the thesis requirement of the BSCS program.
2. Research Locale. Tell something about the organization or group where the research will
be conducted. This organization usually is the target beneficiary of the proposed system
software. In the sample capstone project, the organization under study is the JIL Church at
Calamba City.
This part may NOT applicable for a BSCS thesis. Instead of research locale “A
Description of the Area in Computer Science under Study” shall be discussed in Computer
Science theses.
Example
It was on June 15, 1986 when the first worship service of the Jesus Is Lord Fellowship
Calamba Chapter, now Jesus Is Lord Church Calamba Chapter was held with hundreds of
attendees, guests and visitors and even pastors from other Evangelical churches. But its

Module 2 - Page 4 of 25
second worship service revealed the actual number of attendees consisting of only fifty (50)
estimated attendees, a resident pastor and three volunteered workers.
During the JIL’s first few years of operation, information managing is not problem.
Almost all of its attendees know each other and the resident pastor can easily recognized
and call them by their names. Thus, if one attendee was not able to attend Sunday services
for several times, the Follow-up Ministry can easily recognized them and make an
appropriate decision and action like house visitation to discern the reasons why their
brethren was unable to attend their worship service. This will enable the Follow-up Ministry
to make a sound biblical advice.
3. The existence of an unsatisfactory condition; a felt problem that needs a solution. A
solution that involves development of a system software.
Example
At present, this situation does not hold true anymore. The JIL Church now has an
average of one thousand attendees per week. Sometimes, during special worship service,
the total number of attendees reached one thousand five hundred at the most. And sadly,
because of poor information management, the leadership was unable to produce the list of
additional five hundred attendees. This made the Follow-up Ministry helpless in achieving
the JIL Calamba’s Vision of “Harvest 3000 plus souls.” Additionally, a regular attendee who
was absent during the last two to three weeks was hardly noticed. Only those popular
attendees can be recognized absent and consequently they are the only member of the
Church who are being followed up or being taken care of. Decision making, consequently is
done under uncertainly.
4. A desire to find a better way of doing something or improving the present system.
Example
It is for this reason why, the proponent, being a member of the JIL Church, gains a
deepest desire to find a better way of improving the present condition by developing a
software called as “Church’s Decision Support System” (CDSS), that will help solve the
unsatisfactory monitoring of the attendance of JIL Church member.
If all the elements of a good introduction are present so that in the end, it will be
able to convince the reader or a person who shall be benefitted by the proposed project
that there is really a need in doing the same, then, such introduction has set the Project
Context of a capstone project. Bear in mind that the “project context” forms part of the
Introduction.
The project context is the environment in which a project is undertaken. It has two
key perspectives: internal as defined by the organizational structure, management,
behavior and culture external as defined by the business environment in which the
organization operates, including legislation and regulation, professional and industrial
standards, and market sectors. Project sponsors and managers needs to understand both
the internal and external factors that can affect their projects. This topic explains the
environmental factors that affect projects. It describes approaches for analyzing internal
and external factors and managing stakeholders. This is the reason why “project context”
is not included in thesis involving foundations of Computer Science.

Module 2 - Page 5 of 25
The above introduction except for No.2, is also applicable for a BSCS research.
Instead of focusing on the research locale, the researcher should provide a background on
the area of computer science involved in his research.

Suppose we have a computer science thesis entitled:


Battleship: An Artificial Intelligence for Battleship Game using Genetic Algorithm
The following is a good introduction.
1. Presentation of the importance of the software to be developed. This must be the
start of an introduction. Here the software to be developed is Artificial Intelligence
(AI).
Today, advanced technology is trying to master the creation of the
brain related to the world of Artificial Intelligence. Artificial Intelligence is
the ability of machines to do things that people would say require
intelligence. Artificial Intelligence aims to improve machine behavior in
tackling such complex tasks. Together with this, much of the AI research is
allowing us to understand our intelligent behavior.
There are many different approaches to artificial intelligence and
none of which are either completely right or wrong. Over the years, trends
have emerged based on the state of mind of influential researchers, funding
opportunities as well as available computer hardware.
2. A Description of the Area in Computer Science under Study. In our sample thesis,
the area in computer science under study is AI.
Demo
AI research is an attempt to discover the describe aspects of human
intelligence that can be simulated by machines. A good example, play games
of strategy and learn to play better that people. Gaming is one genre of
software programming that has been slowly borrowing more and more from
the field of Artificial Intelligence.
Game playing has remained a valuable subfield of AI research with
the potential of shedding light on and testing AI results in other domain. And
games will remain a challenge to AI researchers, providing a domain in
which efforts can be focused on expert systems, knowledge representation,
and learning.
3. A statement indicating that an improvement can be done.
Demo
Nowadays, Games are no longer just a distraction from studies or
work. They are becoming an artistic form of expression for the programmers
and developers and a serious hobby and undertaking for the players.
Games are learning devices, and the fundamental quality of good
learning is one which is appropriately demanding and manageable. Games
are exploring the capabilities of artificial intelligence. The rules are fixed, the
scope of the problem is constrained, and the interactions of the players are
well defined.

Module 2 - Page 6 of 25
4. A desire to find a better way of doing something or improving the present system.
Demo
The aim of game Artificial Intelligence is not to provide a lasting
challenge, but to provide a smoothly ramping level of difficulty, while the
player is learning to think either strategically, tactically, or reactively.
Artificial intelligence in games takes the role of a never-bored and never-
boring opponent.
Formulating the Statement of the Problem / Objectives of the Project
There should be a general statement of the whole problem followed by the specific
questions or sub-problems into which the general problem is broken up.
Guidelines in formulating the general problem and specific questions:
1. The general statement of the problem and the specific questions should be formulated
first before developing the software program.
2. Each specific question must be clear and unambiguous.
3. Answers to specific questions must contribute to the development of the whole research
problem or capstone project.
4. The number of specific questions should be enough to cover the whole problem or case
under study.
5. Generally, there should be a general statement of the problem and then broken up into
many specific questions as necessary.
Sample Illustration:
Illustrate, let us provide a sample Statement of the Problem for an IT capstone project,
thus:
The main problem of the project is to assist the Tabako University in the admission,
registration, monitoring and advising of their student. Specifically it attempted to answer the
following questions:
1. How to design and develop a Web-based system called Admission Registration and
Monitoring System (ARMIS) which will be capable of:
a. Providing and efficient on-line enrollment system wherein payment may be made
in campus and out campus;
b. Providing and advising system by generating appropriate courses which should be
registered by the students considering the pre-requisites and co-requisites of
courses provided in the student’s program of study;
c. Allowing faculty members to encode the grades during a period to be determined
by the use;
2. What is the level of conformity of the ARMIS software with regard to the ISO 9126
standards?
3. How to implement and deploy the ARMIS software in order to maximize organizational
benefits?

Module 2 - Page 7 of 25
In correctly observing the above examples, problem statements do not refer to the
problems being experienced by the organization under study nor the gaps in the theoretical
aspects of computing. Rather, the statement of the problems refers to the challenges, goals or
objectives which are needed to be accomplished by the proponents. It has been observed that
one of the common errors manifested in some capstone projects of computing students is that
under the “Statement of the Problems”, they put herein those unsatisfactory conditions that
needs solutions. These unsatisfactory conditions should be mentioned under introduction
coughed in general terms and discussed in details under the “project context” under Chapter 1.
Objectives of the Study
The objectives of the study guide the researcher and the reader to know what the
proponents(s) need to do. These usually follow the chronological sequence of the statement of
the problem and its specific questions.
Objectives are written by either beginning with an action verb or an infinitive.
Demo.
For example:
- to determine the efficiency of the system as perceived by the employees; or
- identify possible problems encountered with the present system.
Example:
The main objective of the project is to assist the Tabako University in the admission,
registration, monitoring and advising of their students. Specifically it aims to:
1. Design and develop a Web-based system called Admission Registration and Monitoring
System (ARMIS) which will be capable of:
a. Providing and efficient on-line enrollment system wherein payment may be made
in campus and out campus;
b. Providing an advising system by generating appropriate courses which should be
registered by the students considering the pre-requisites and co-requisites of
courses provided in the student’s program of study;
c. Allowing faculty members to encode the grades during a period to be determined
by the use;
2. Evaluate the ARMIS in order to determine if it complies with the ISO 9126 standards;
3. To prepare an implementation plan for the deployment of the ARMIS.
Notice that the Objectives of the Study is the same as the Statement of the Problems. The
only difference is that the latter is written in an interrogative form while the former is in the
declarative form. Thus, a researcher may use either one of the two. In technical research like
Computing. CHED’s template strongly suggested that we use Objectives of the Study instead of
Statement of the Problem for all IT/IS capstone project and Computer Science theses dealing
software development. Statement of the problem shall be used only for theses in computer
science dealing with foundations and mathematical aspects of computer science.

Module 2 - Page 8 of 25
Normally, there are usually three to five objectives of the study.
Demo.
Sample objectives for our Computer Science thesis involving Artificial Intelligence and
Genetic algorithms are the following:
General Objective:
This study aims to develop a game application that uses genetic algorithm for the games’
artificial intelligence that can compete with the abilities of the human.
Specific Objectives:
The following statements are the specific objectives of the study:
1. To impellent the Battleship board game in mobile phone supported with Google’s
Android Platform.
2. To develop Artificial Intelligence for Battleship game with easy and difficult level.
3. To use Genetic Algorithms in developing the game’s Artificial Intelligence.
At any rate, in objectives and statement of the problems, the totally of each
objective/problem statement should contribute to the development of the software to be
developed and/or formulation or improvement of mathematical models, algorithms and
computer science theories as the case may be.
Demo.
In the research entitled “The Mythical Adventures of Mang Kanor: An Action-Adventure Game”,
the general and specific objective of the study are presented in this wise:
General Objective
The general objective of the study is to develop an action adventure game, and famillirize
the players about the mythical creatures believed exist in Visayas region. According to an article
written by Miguel Almario of Clarksville Middle School and Micha F. Lindemans said that there are
isolated islands and barrios in Visayas familiar about the different way of living and secrets of these
mythical creatures.
Specific Objectives
- Introduce the story of the mythical creatures in the Philippines through game
development;
- Integrate appropriate algorithms to be applied in the game, and
- Evaluate the game in terms of its functionality, usability, reliability, efficiency.
Statement of the Problem vs. Objectives of the Project
The author have spent too much time thinking about and in fact have browsed different
researches in computing to see how the two terms are being used. The authors are privileged to
be members of panel of examiners of different colleges and universities. They noticed that either

Module 2 - Page 9 of 25
statement of the problem or objectives of the project is required in any thesis and/or capstone
project. In some schools thesis/capstone project format, both required. Unfortunately, the only
difference between the statement of the problems and objectives is that the former is written in
interrogative form while the latter is written in declarative form. It is our humble opinion that such
is redundant. This should not be the case.
Question: Is it absolutely wrong to include both statement of the problem and objectives
of the project/study?
Answer: Not really.
While it is true that one of the differences of the Statement of the Problems and Objectives
of the Project is that the former is written in interrogative form while the latter is written in
declarative form, this difference is not determining factor in choosing what to use between the
two.
Please bear in mind that in purely computer science thesis, both statement of the problem
and objectives are required. In any other cases, only objective of the study/project is required.
Why is this so?
The real and the substantive difference between the significance of the study and
objectives of the study/project will reveal the answer.
In purely computing thesis, the researchers need to reach new conclusions, establish new
facts, and learn as much as about the truth possible. Again, we will say it again, “we researchers
to understand the world” or to explain “why things happen”.
In layman’s terms, if we want to know if Pedro is in his house in Cabuyao, the answer could
be positive or negative. The question, “Is he(Pedro) in the house?” is a researchable problem
because we are not sure what will be the answer to this question. In this case, “statement of the
problem” should be used. Now, if we are certain already that Pedro is in the house and we want
to command him to clean the house, we are certain what will be the outcome of our purpose, that
is, the house will be dirt free or less dirty at the very least. In this case, the “objectives of the
project” should be use. It is also for this reason why in a software development, conclusions is not
required because in software development, the proponent begins with the end in mind, the end
in mind refers to the requirement documentation. So, there is no need to conclude that is his
objective or goal. Remember, we design to “make things happen” so we should NOT conclude and
explain “things” happen in a capstone project.”
The Significance of the Study and the Purpose and Description
At the outset, the students should be made aware that in CHED’s suggested template for
thesis / capstone project, significance of the study is only included in computer science theses
concerning foundations of computer science. Other topics in computer science as well as those of
capstone projects require purpose and description.
Significance of the Study

Module 2 - Page 10 of 25
The statement of significance is an important part of a scientific report particularly in
computer science theses involving foundations of Computer Science. All scientific studies should
be significant in one way or another, because as mentioned in Chapter I, it is intended to add to
the body of knowledge. The significance of the study therefore will assert and explain to the reader
why the study is vital and essential. Simply stated, this part of the thesis will provide the
contribution of your study to the field of the computer science. In other countries, this part of the
thesis is termed as “Contributions.”
Demo.
Dr. Manjunath Narayana, in his Computer Science thesis entitled PROBABILISTIC MODELS
FOR MOTION SEGMENTATION IN IMAGE SEQUENCES, explain the contribution or significance of
his study in this wise.
Contribution of the Thesis
The main contribution of the include:
1. Description of a probabilistic background model that intuitively combines location specific
priors and spatially smoothed appearance likelihood for the background and foreground.
2. Improvements to stationary camera motion segmentation algorithms by using pixel-wise
adaptive kernel variances resulting in the art accuracy of bench mark data.
3. Development of an accurate moving camera motion segmentation algorithm that
addresses current challenges in segmentation by using optical flow orientations in non-
parametric probabilistic mode.
4. Introduction of a rotation compensation algorithm that enables the application of the
segmentation algorithm to videos that contain both translation and rotation motion of the
camera.
Purpose and Description
The purpose and description as part of the outline for Capstone Project as well as that of
a computer science thesis involving software development is similar but not identical to
significance of the Study of a Computer Science thesis involving foundations of Computer Science.
In writing purpose and description, the proponent must state the function of his capstone project.
It should not attempt to claim that the project will add to the body of knowledge. It is for this
reason that the authors humbly submit, that members of the panel of examiners should not ask
the proponents the following question.
“What is the contribution of your capstone project to the body of knowledge?”
This is because IT and IS capstone projects, generally, do not contribute to the body of
knowledge but focuses on the contribution of the project to its specific beneficiaries.
Hence, the importance of the capstone project must contain explanations or discussions
of any or all of the following:
1. The rationale, timeliness and relevance of the study.
2. Possible solution to existing problems or improvement to unsatisfactory conditions.
Module 2 - Page 11 of 25
3. The beneficiaries, and how they are going to be benefited.
4. Possible contribution to the fund of knowledge (if any).
5. Possible amplifications.
It is good to start the purpose and description by providing the function of the capstone
project, thus:
Demo
In the capstone project entitled, “Development and Evaluation of Classroom Schedule Generator
(CSG): An Expert System Using Microsoft Visual Basic” the Purpose and Description was written as
follows:
Purpose and Description
The project was conducted in order to assist the school administrators in the preparation
of classroom schedules as well as teaching loads of faculty member every term or semester by
developing a software called Classroom Schedule Generator (CSG). Once developed, CSG shall
automatically prepare the classroom schedules of students and teaching loads of faculty members.
After providing its function, the second paragraph should provide description of the project
by enumerating its features and capabilities. The following paragraph is a good illustration, thus:
CDS, an expert system have the following:
1. Assign classes, lecture or laboratory, in appropriate rooms, Hence, lecture classes shall
not be assigned to laboratory classrooms and laboratory classes shall not be assigned
to lecture classes.
2. Maximizes room, student and faculty schedules depending on the priority set by the
users. Hence, if there is a shortage of faculty member, say, only one teacher can handle
a particular course, then the highest priority shall be set to faculty. On the other hand,
if there is only one computer laboratory room, the highest priority shall be set to the
said laboratory room.
3. Assigned teaching load of faculty members is accordance to the course and time
schedule preference set by the users. So, in case of part time faculty members, is only
available T-Th 5:00 – 9:00 PM, the system cannot assign classes to him beyond the said
schedule;
4. Ensure that only four(4) preparations shall be given to any faculty members;
5. Provide full load for fulltime faculty members depending on the number of units set by
the user. So, if fulltime faculty members is teaching 18 units, 18 units shall be set; if the
teaching units is set beyond 18 units, it means that the dean is allowing the said faculty
members to have overload.
6. Make the appropriate recommendation in case there will be not enough resources in
making schedules.
After enumerating the project’s features and capabilities, the last paragraph should explain
project’s rationale, timeliness and relevance by illustrating that it will solve existing problems.
Possible beneficiaries as well as implications may also be given. Our next example involving IT
Module 2 - Page 12 of 25
Capstone Project entitled Acceptability of the Multipurpose Community Information and
Telecenter (MCIT) prototype towards E-Governance and Bridging the Digital Divide provides a
good example of how the specific beneficiaries will be benefited by the project.
Demo
Purpose and Description
Information and Communication Technology (ICT) usage particularly the Internet has
become a valuable resource throughout the country. Its use has forever changed the way people
communicate, do business and are educated. Physical distance between people have been
narrowed as the Internet has made it possible to reach people almost instantly. At the same time,
grave inequities exist in terms of who actually has access to Internet services. This discrepancy in
access is called Digital Divide. Data show that the Internet and Computer Technologies are
available far more to wealthy and educated people than they are to the poor and to racial
minorities. The purpose of the project to bridge the so called digital divide.
Once the proposed MCIT, which promotes the use of ICT, is implemented to every barangay
in the Philippines, it will give the following national significance particularly to the following:
1. National Economy. The Digital Divide is an essential issue to be addressed by the study
because not all citizens are able to enjoy the benefits that come from ICT usage particularly
the Internet. The Internet is an important resource that has grown because of its
universality, yet there are millions of people who simply cannot access the new technology
because of its cost. The Internet, then, is an essential good because of the role it plays in
communication and commerce worldwide. However, if the Internet remains an
unattainable good to citizens of lower socioeconomic status, it could intensify current social
divisions, resulting in wider economic inequities. Establishing Community Telecenters to
every barangay which typically provide public access to computers, the Internet, and other
communication technologies, is the first step towards bridging the digital divide.
2. Commission on Election (COMELEC). During every election, registration and validation of
every citizen of the country shall no longer be needed. The Commission on Elections
(COMELEC), after an appropriate process, can retrieve the records of every citizen of every
citizen for each barangay. In addition, double registration is not possible in an MCIT enabled
barangays. This is because the MCIT prototype uses biometrics technology particularly the
fingerprint of an individual as key for identification. Henceforth, the integrated system can
easily detect, multiple fingerprints in different barangays.
3. National Statistics Office (NSO). The regular census conducted by the National Statistics
Office for each barangay in the whole country shall be minimized. This is because MCIT
barangays have updated records, and therefore, the NSO can retrieve the database instead
of doing costly census usually conducted by inexperienced workers. The amount of money
that shall be saved by the NSO and COMELEC when MCIT system us implemented for each
barangay in the country cannot be discounter.
4. Local Government Units (LGUs). With the proposed MCIT system. Chapter 5, section 394 (d)
(6) of the local government code which states “The Barangay secretary shall keep an
updated records of all inhabitants of the barangay containing the following items of
Module 2 - Page 13 of 25
information: name, address, place and date of birth, sex, prescribed by law or ordinance”,
shall be fully implemented. Aside from being compliant with the law, MCIT enabled
barangays will be effective in managing information. The computer based information
system will provide information to the concerned individual/barangay officials in the proper
form at the proper time. This will ensure that legal documents acquired from barangay are
reliable, accurate and dependable. Furthermore, the study will also provide the concerned
LGU with basic knowledge management skills since knowledge mapping can be done using
MCIT system. The system can be used to retrieve the list of experts from a certain LGU. This
will help the LGU from barangay level to provincial level in seeking professional assistance
for their project. The system in return will help the knowledge workers in earning more
income.
5. The General Public. Since MCIT barangay is not just an information center but also a
Telecenter, the study will make MCIT-enabled barangay as an outlet for the general public
with affordable access to a variety of services using ICTs especially from government Online
Services such as NSC (e-Census), SSS (on-line inquiry), GSIS (e-GSIS), DIT (i-Reklamo Online
Consumer Assistance) DBM (Electronic Procurement System), DFA (Passport Renewal
Online Form), DBM (Electronic Procurement System), DFA (Passport Renewal Online Form),
BIT (Electronic Tin Verification) and many others.
6. Researcher. Since the study looked into the aspects of information management resources
and practices, extent of ICT usage, the level of the acceptability of the MCIT prototype and
the factors that may affect the respondent’s level of the acceptability of the MCIT prototype
and factors that may affect the respondent’s level of acceptance involving a total of one
hundred seventeen (117) respondents from different barangays from selected
municipalities of the Province of Laguna, the Research, IT Management and Decision
Making capabilities of the researcher will surely be improved. In addition, the researcher
was able to personally discern the problems met by concerned barangays and apply the
right technology and management principles that would resolve the present unsatisfactory
conditions. Furthermost, the researcher became on of the knowledgeable persons in the
establishment principles that would resolve the present unsatisfactory conditions.
Furthermost, the researcher became one of the knowledgeable persons in the
establishment of Multipurpose Community Information and Telecenter which in return will
prepare him as future Information Technology Consultant and/or Manager.
7. Future Researchers. Before the establishment of MCIT in the different barangays in the
country, its level of acceptability must first be known. The cost of establishing community
telecenter must be known vis a vis the financial capabilities of the LGUs concerned. The
findings and conclusions of the study will be significant to both allies and critics of
Community Telecenter Movement.
Obviously, the proposed study is a response to the challenge of bringing the rural villages
out of isolation by making the information society to be more about inclusion rather that exclusion.
Henceforth, the study will help in alleviating the digital divide in the country of not int the whole
world.
Scope and Limitation of the Study

Module 2 - Page 14 of 25
The section may be subdivided into two parts, the Scope and Delimitation and Limitation of
the Study.
The Scope and Delimitation of the Study should include a brief statement of the general
purpose of the study, the target users/beneficiaries of the study, the period purpose of the study
and the features of the proposed software.
The limitation of the study includes the weakness of the study beyond the control of the
researcher. This section may be not be included in the study if there is no such weakness of the
study beyond the control of the researcher.
Demo
Example. (Development and Evaluation of CAI of Biological Science for the Second Year Students of
Laguna State Polytechnic Collage – Cabuyao Campus)
Scope and Delimitations
The study involved the development and testing of the effectiveness of CAI in the teaching
and learning of the human muscular system. The researcher was responsible in gathering the
necessary data and information in developing the lessons. In developing the CAI, however, she
sought the assistance of the programmer.
The study was confined to three groups of Natural Science students of Laguna State
Polytechnic Collage for the first semester of the school year 2000-2001.
The subject matter focused on the human muscular system, which include the following
particular topics: Types and Structure of Muscle; and Skeletal, Contraction and Energy Sources for
Muscle Contraction. These topics were discussed for six meetings of one hour each. The study dealt
largely on the evaluation of the effectiveness of CAI alone and the use of combination of CAI and
the teacher-directed method.
The data of the study were drawn from the test results. Other factors like age, school, home,
and peer factors were not considered in the study. Subjects profile was considered to provide
reference if in case other variables affect the reliability obtained.
This study has no limitation that is beyond the control of the researcher.
Analogy:
Subject Scope of CAI: Muscular System
The scope is muscular system. The CAI did not include other systems such as Digestive
system, circulatory system and the like. The researcher delimited the scope. The researcher might
include additional systems of the human body if he wants to.
The above illustration is more on an educational research involving pedagogy. In a
capstone project involving software development, this section should explicitly states the
limitation of the software or system product which might be expected by a reasonable, discreet
target beneficiaries or end users.

Module 2 - Page 15 of 25
Demo
To illustrate, in a capstone project entitled “Development and Evaluation of Classroom
Schedule Generator (CSC): An Expert System Using Microsoft Visual Basic.” Part of the delimitation
of the capstone project includes:
The proposed Classroom Schedule Generator (CSG) shall automatically generate schedules
using the following template or any two-day combination of any class schedule:
M-Th - Mondays and Thursdays
Tue-Fri - Tuesdays and Fridays
Wed-Sat - Wednesdays and Saturdays
Thus, MWE, TTHS, or once a day schedule cannot be generated by the proposed CSG.
If the above delimitation was expressly stated during the proposal stage and was accepted
and approved by the panel of examiners, then fairness, justice and equity dictates that any other
member of the panel of examiners cannot impose additional features during the final defense
which was expressly stated in the Scope and Delimitation of the Project.
Conversely, if the student did NOT reveal this delimitation in the Scope and Limitation and
during oral examination, any suggestion of the panel examiners which is not clearly stated under
this section, will be justifiable. Hence, the authors strongly suggest that the students/proponents
should be open, transparent and honest in writing his thesis or capstone project proposal, the
scope and limitation of his project.
Demo
In the research work entitled, “Human Resource E-leave Management: A Decision Support
System”, the scope and limitation of the study was written in this wise:
Scope and Limitations of the Study
The online leave management system was designed, developed and implemented taking
the distinction of the leave of absence policies, types of leaves and the leave management of the
university. This system was developed using the same technologies and tools used by the MIS
team to maintain consistency in design and minimize problems in programming and conflicts in
implementation when integrated to the whole HNUIIS.
The HRDM Officer advised that the study shall not include Solo Parent Leave and the Leave
of Absence with Pay (study leave) because the drafting of the policies of such leave types is still
ongoing. Further, the Leave of Absence with Pay (study leave) is not considered as one of the
regular leaves because it is under the HRD Scholarship Program. The scope of this project is limited
to several processes: handling of employees’ leave applications, managing leave balances, records
management, administration, leave management. It will generate the reports such as leave trends
of the company, employee availability, employee leave balance, leave rejection, leave acceptance,
employees with “no leave in the academic year”, and absence monitoring.

Module 2 - Page 16 of 25
Definition of Terms
Generally, the Definition of Terms is not required either in Computer Science theses and
IT/IS Capstone projects, however, in case your project will be using different terms which will be
susceptible to different interpretations, this section will be necessary.
Guidelines in Defining Terms:
1. Only terms, words, phrases, which have a special or unique meaning in the study, are
defined.
2. Terms should be defined operationally, that is, how they are going to be used in the study.
3. The researcher may develop his/her own definition from the characteristics of the term
defined. Thus, the level of efficiency of a system may be defined as a researcher-made
scale to measure the efficiency.
4. Definitions may be taken from encyclopedias, books, magazines, newspaper articles,
dictionaries, and other publications but the researcher must acknowledge his/her sources.
Definition taken from published materials are called conceptual or theoretical definitions.
5. Definitions should be brief, clear, and unequivocal (no double meanings).
6. Acronyms should always be spelled out fully especially of it is not commonly known or if it
is used for the first time.
There are two ways of defining the key terms of the study. These are (1) technical, and (2)
operational. In technical definition, the meaning of the terms is taken from the dictionary or
encyclopedia. In operational definition, the meaning of terms is based on an observed
characteristic and how it is used in the study.
Example: (Development and Evaluation of CAI of Biological Science for the Second Year
students of Laguna State Polytechnic College)
Definition of Terms
Technical Terms
For the purpose of this study, the following technical terms were used and defined to serve
as reference to the readers.
- Program Testing – It is a method of using the program for the purpose of error checking.
- Computer Information System – It is a computer system used to collect, sort, process and
present information to support its organizational needs.
- Operational Terms – For the purpose of this study, the following terms were used and
operationally defined to serve as reference to the readers.
- Pretest – It is the test given to all students in the three groups before that actual
experiment to determine the comparability of the groups and to determine the stored
knowledge of the students.
- Posttest – It is the test given to all students in the three groups after the experiment.
The Theoretical and Conceptual Framework

Module 2 - Page 17 of 25
The theoretical and conceptual frameworks are not specifically mentioned in Computer
Science thesis and IT Capstone Project in CHED’s suggested template. However, it doesn’t mean
they are not required. In capstone projects, especially in IS Capstone projects, the theoretical
framework should be required.
Recall that the Bachelor of Science in Information Technology (BSIT) program is the study
of the utilization of both hardware and software technologies in planning, installing, customizing,
operating, managing, administering and maintaining IT infrastructure that provides computing
solutions to address the needs to an organization while the Bachelor of Science in Information
Systems (BSIS) programs includes the study of application and effect of information technology to
organizations. Consequently, one of its program outcomes reads as follows:
“An ability to analyze the problems, identify and define the computing requirements with respect
to organizational factors appropriate to its solution and plan strategies for their solution.”
Thus, in designing the IS plans, the theoretical of conceptual framework or both shall be
necessary. In an IT capstone project, the development of software is strongly influenced by both
the internal as well as the external environment of the concerned organization under study. These
environments include the culture, processes, standards, nature of business, policies, ethical and
legal constraints, among others. Henceforth, the conceptual or theoretical framework shall be
necessary.
While it is true that these frameworks are not explicitly included in CHED’s suggested
template, they are implicitly included under “Requirement Analysis” of an IT/IS capstone projects,
and under Design and Methodology under Computer Science theses involving Software
Development. Regardless of the template or the place where these frameworks will be written,
the following sections will provide the reads how to write them.
Writing the Theoretical Framework
The theoretical framework presents the theory from which the research problem was
derived in the case of some experimental studies, or to which it is linked (in the case of some
survey studies). In formulating the theoretical framework for the study, you may look at the
various theories upon which you serve as the basis for the study.
The theoretical framework is a symbolic construction which uses abstract concepts, facts
of laws, variables and their relations that explains and predicts how an observed phenomenon
exist and operates. An investigator is required to formulate existing theories which link his study
because theories are useful device for interpreting, criticizing, and unifying established scientific
laws or facts that guide in discovering new generalizations.
A theoretical framework is based on an existing explanatory theory or theories which may
form the bases for the researcher’s observations and become the frame of reference by which the
conceptual framework may be derived. The framework may be existing models from previous
empirical researches or theories which are applicable to the current research. The theoretical
framework shapes the justification of the research problem in order to provide the legal basis for

Module 2 - Page 18 of 25
defining its parameters, It is desirable for an investigator to identify key concepts that are used in
the study for better understanding of the role of theory in research.
Conceptual Framework
The conceptual framework presents the relationship between the specific concepts that
may be studied. The concepts used at this level should be derived from the concepts used in the
theoretical framework. They should be more concrete.
After initial exploration of research so far on the topic, the author can make a more specific
conceptual framework. It is at this point important that the author operationalizes (i.e. defines at
the least, and possible indicates how concepts can be measured or judged) the various concepts
in the research question method and how he/she will investigate the topic.
A conceptual framework is a collection of interrelated concepts, like a theory but not
necessarily so well worked-out. A conceptual framework guides your research, determining what
things you will measure, and what statistical relationships you will look for.
The conceptual framework may be accompanies by a symbolic representation of a phenomenon
or a diagram usually given a schematic representation using arrows and boxes.
Demo
Example of theoretical and conceptual framework (From Dissertation of Charlemagne Liviña,
2006).
Theoretical Framework
The study was premised on the theory that the use of Information and Communication
Technology (ICT) of every firm including government offices really impact the quality of services in
information management and thus increase level of satisfaction of their customers. Information
according to Mcleod and Schell (2001) is one of the five main types of resources to which the
manager has access. All the resources, including information, can be managed. The importance of
information management increases as business becomes more complex and computer capabilities
expand.
Mark Warschauser (2002) state that the physical availability of book or other reading
material is of course essential for the acquisition of literacy, but the other resources are equally
important. As for relevant and accessible content, one of the major obstacles toward literacy
acquisition is the dearth of published material in many if not most of the 7,000 languages that are
spoken around the world. In addition, Paolo Freire (1994) and others have shown that literacy
instruction is most effective when it involves content that speaks to the needs and social conditions
of the learners. And, as with ICT – related material, this content is often best developed by the
learners themselves.
Mark Warschauer (2002) further states that, access to ICT for the promotion of social
inclusion cannot rest on the provision of devices or conduits alone. Rather, it must entail the
engagement of a range of resources, all developed and promoted with an eye toward enhancing
the social, economic, and political power of the targeted clients and communities. Any attempt to
Module 2 - Page 19 of 25
categorize these resources is by nature arbitrary, but an analysis based on four general categories
serves the purpose of both analysis and policymaking. They can be labeled (1) Physical Resources,
(2) Digital Resources, (3) Human Resources, and (4) Social Resources. Physical resources encompass
access to computers and telecommunication connections. Digital resources refer to digital material
that is made available online. Human resources revolve around issues such as literacy and
education (including the particular types of literacy practices that are required for computer use
and online communication). Social resources refer to the community, institutional, and societal
structures that support access to ICT.

Theoretical Framework of the Study (Warchauser, 2002)


In considering these four sets resources, it is important to realize their iterative relation with
ICT use. On the one hand, each of the resources is a contributor to effective use of ICTs. In other
words, the presence of these resources helps ensure that ICT can be well used and exploited. On
the other hand, access to each of these resources is a result of effective use of ICTs. In other words,
by using ICTs well, we can help extend and promote access to these resources. If handled well, these
resources can thus serve as virtual circle that promotes social development and inclusion. If handled
poorly, these elements can serve as a vicious cycle of underdevelopment and exclusion.
The study of Scott Kaiser (2001) revealed that for a Community Telecenter to have an
impact on its community and therefore be accepted by it, a commitment by national leaders
particularly policy makers who recognize the value of connecting the people the country through
the modern tools of Information Society, and follow that commitment with funding and
organizational support for multiyear programs. The centers that are well funded and can offer
strong educational programs do a good job in providing a service to their community. These centers
are successful in teaching children and helping adults move off welfare rolls. However, in the case
of the centers that struggle financially, it is difficult to attract community residents due to the
limited availability of computers and simply a limitation on the number of hours per day the center
can operate. Nevertheless, simply by being in the community and offering residents the opportunity
to have some access to computers and the Internet, the centers are performing a valuable service
that is much needed in terms of bridging the Digital Divide.
Conceptual Framework

Module 2 - Page 20 of 25
The basic working knowledge of the computer necessary to function in today’s world is
called computer literacy. This knowledge include an understanding of computer terminology,
recognition of the strengths and weakness of the computer, an ability to use the computer although
not necessarily to program it, and so on. In addition to understanding the computer, the modern
manager should have information at each step of the problem-solving process, where that
information can be obtained, and how to share information with others.
Information literacy is not dependent on computer literacy. A person can be information
literate but not computer literate. Ideally, however, a manager should be both computer literate
and information literate.
Cisler (2000) argues, there is not a binary division between information “haves and have-
nots”, but rather a graduation based on different degrees of access to information technology.
Compare, for example, a professor at UCLA with a high-speed connection in her office, a student in
Seoul who occasionally uses a cyber-café, and a rural activist in Indonesia who has no computer or
phone line but whose colleagues in her women’s group download and print out information for her.
This example illustrates just three degrees of possible access a person can have to online material
and illustrates the concept of digital divide.
The Study’s Conceptual Framework is shown in Figure 2.

Module 2 - Page 21 of 25
The Conceptual Framework of the Study
The figure depicts that the level of municipalities, which stands for the financial status of
every municipality, is one factor that may influence the social resources (IRA) of barangays, level of
ICT resources, management support and ICT literacy of barangay officials and which in effect,
influence the extent of ICT usage.
The differentiation of the level of the extent of ICT usage signifies digital divide among
communities from the different level of municipalities.
The extent of ICT usage will determine the possibility of adapting the MCIT prototype for E-
Governance which will give effective information management and better service delivery for
barangay constitutes.
Other Styles of Developing Conceptual Framework
These other styles are the ones appropriate for Computing programs.
Style 1
Paradigm of the Independent and Dependent Variables

Style 2 uses the Input Process Output (IPO) chart. This is what we usually do in technical
research.
Example:

Module 2 - Page 22 of 25
Notice that our illustration provides two (2) ways of presenting the IPOs. Students are
confused because some thesis panels require the first while other requires the second. Both of
them are correct.
Before writing the theoretical and conceptual framework, the researcher must first read
and study some literatures and previous studies related to his study. From these literatures and
studies, the researcher may now formulate a theoretical scheme for his research problem. This
scheme is a tentative explanation or theoretical explanation of the phenomenon or problem and
serves as the basis for the formulation of research hypotheses. Thus, the theoretical/conceptual
framework consist of the investigator’s own position on a problem after his exposure to various
theories that have bearing on the problem.
Demo

Module 2 - Page 23 of 25
In the research entitled “The Mythical Adventures of Mang Kanor: An Action-Adventure
Game”, the conceptual framework of the study are presented in this wise:
Conceptual Framework
In the figure below, it shows the conceptual framework of the game.

Figure 2. Conceptual Framework

To create successful 3D computer game knowledge, skills, hardware and software are
needed. Since The Mythical Adventures of Mang Kanor is focused in mythical creatures and need
to be built in a computer/laptop with Dual core processor or higher, familiarity in the mythical
creatures and computer game development is needed. The development of the project requires
Module 2 - Page 24 of 25
idea about the mythical creatures, Javascript, Kinematic Movement Algorithm: Arriving behavior,
Steering behavior, Wandering behavior and Path Following Algorithm. To come up with a working
game, it is also required to have a hardware and software. The required hardware is personal
computer or laptop with physical memory at least 1GB for creating, testing and building the game.
The software needed are Unity 3.5.5 with IDE mono develop that used for creating terrain import
characters from 3DS Max, scripting and building the whole project and Adobe Photoshop CS3 was
used for editing textures for mapping characters, other 3D objects and for GUI interface design.
Activity
A. The significance of the study is required only in computer science theses dealing with
foundations in computer science and should not be required for IT and IS capstone
projects. Give the rationale.
Exercises
B. Explain the significant and relevant distinction of statement of the problem and
objectives of the project.
Reflection
C. Differentiate Purpose and Description against Significance of the Study.

*** Disclaimer: We do not take ownership of any Intellectual Property that is included in this
module. All rights belong to their rightful owner. Books, Websites and other learning materials
referred to this module is properly cited in the references section at every module. ***

Suggested Readings, Resources and Additional Resources

− C.R Kathari. Research Methodology Methods and Techniques Second Revised Edition.
New Age International Publishers, 2004
− Charlemagne Garcia Laviña, Renelina Delmo Mañabo, Gloria Dela Cruz Hernandez, Fe
Larwa Hablanida, Alice Maldonado Lacorte, Jonalyn Gaza – Ebron. Outcomes-based
Practical Guide to Thesis and Capstone Project Writing in Computing. Mindshapers Co.,
Inc. 2016.
− Thomar S. Clary. Horizons in Computer Science Research Volume 5. Nova Science
Publishers, Inc. 2012
− Janice P. Bauer. Computer Science, Technology and Applications – Computer Science
Research and Technology Volume 3. Nova Science Publisher, Inc.

Prepared by

ACE RYAN A. LABAMPA

Module 2 - Page 25 of 25

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy