PROJECT Crime Management Information Systems
PROJECT Crime Management Information Systems
PROJECT Crime Management Information Systems
INTRODUCTION
Scholars and social analysts have defined crime from different perspectives. As such,
a general definition of the concept has eluded the academia for years. While (Farmer
Lindsay, 2008) see crime as a category created by law, (Elizabeth A. Martin, 2003)
provided a more comprehensive definition when she noted that crime or offence (or
criminal offence) is an act harmful not only to some individual or individuals but also
to a community, society or the state ("a public wrong"). It refers to actions that are
forbidden by law; offence against the state, conducts such as committing murder,
stealing property, resisting arrest, driving while under the influence of alcohol and
possessing or selling illegal drugs18 and seen as an act that violates a political or
worldwide to keep record of crime and criminals involved. Crime being an act
against the law of a society is a threat to the well-being of the populace and so,
requires efficient and effective monitoring. For this reason, CRMS have been
1
developed to achieve this purpose. However, in Nigeria, the CRMS employed is
majorly manual, which is, the use of pen and paper (O. Awodele, O. Ernest, O. A.
criminals. This project is mainly useful for law and enforcement agencies in Nigeria.
The law and enforcement authority can preserve records of the criminals and search
any criminal using the system. This is an online web application with database
system in which police will keep the record of criminals who have been arrested. We
have used HTML, JavaScript, CSS, PHP, MySql and Bootstrap to develop this
project. The project’s interface is very user friendly and helpful for authority.
Manual documentation of crime record can lead to exposure and loss of the information,
also the delay during transfer of these records from one department to another. Hence,
there is need for an automated crime record management system to guaranty safety of
information.
2
1.3 MOTIVATION OF STUDY
I realised that the Nigerian police are still making use of manual documentation to record
criminal information as such its impossible for a Nigerian police officer in a state to have
access to criminal record of another state. And the rigorous stress that comes with
transferring hardcopy records from one state to another. During which the confidentiality
of the documented could be altered by anyone that might come in contact with it without
prior authorization to do so. This motivated me to come up with a web-based crime report
management system that could be accessed from anywhere in the world with proper
The Aim of the project is to design and develop a system for Crime record management.
3
1.5 SCOPE AND LIMITATION OF STUDY
The project involves software development of a crime report management system using a
waterfall model that communicates with the database. The following are the scope
concern,
implementation would help a whole lot specifically the Nigerian police force, this project
would be of good use to them allowing them to have quick and easy access to criminal
2. Saving the Nigerian police force the cost of buying papers and files.
3. Saving the Nigerian police, the stress of searching for crime records manually.
4
1.7 DEFINITION OF TERMS AND VARIABLES
Anti-policing: Anti-policing is the society’s social attitude opposed to war between states
National Security: The requirement to maintain the survival of the nation-state through
the use of economic, policing, and political power and the exercise of diplomacy.
recording, or destruction.
6
LITERATURE REVIEW
Over recent years, the field of information security has expanded and developed
substantially. There are many ways to gain entry as a professional into the industry. It
offers many specialization areas including: security networks and related infrastructure,
planning of business continuity and science of digital forensics, etc. For over twenty
years, information security has held confidentiality, integrity and availability (known as
the CIA triad) to be the core principles of information security. Extending this classic trio
suggested for addition-it has been pointed out that issues such as Nonrepudiation do not
fit well within the t three core concepts, and as computer system regulation has increased
Security is the degree to which danger, damage, failure and crime are protected. Security
as a form of protection is a condition for structures and processes that provide or improve
security. The Institution for Security and Open Methodologies, 2003 (ISECOM) in the
7
between the assets and the threat”. This includes but is not limited to the elimination of
either the asset or the threat (Institution for Security and Open Methodologies, OSSTMM
2003).
Safety has to be contrasted with related concepts: safety, stability and reliability, the key
difference between safety and reliability is that protection has to take into account the
situation prevents unauthorized persons from having access to official information that is
safeguarding in the interest of the national security. Measures taken by a police unit, an
activity or installation to protect itself against all acts designed to, or which may, impair
its effectiveness.
example, the fear of earthquakes has been reported to be more common than the fear of
slipping on the bathroom floor although the latter kills more people than the former.
the actual security provided by those measures. The presence of security protection may
even be taken for security itself. For example, two computer security programs could be
interfering with each other and even cancelling each other’s effect while the owner
8
2.3 INFORMATION SECURITY
Information security involves the privacy, reliability and availability, and the proper
functioning of a computer system without regard for the data that the computer has stored
companies collect a lot of confidential information about their staff, clients, goods,
analysis and financial status. Most of this information is now collected, processed and
and a widely used risk management system will be presented (CISA Review manual
(2006)) provide the following risk management description. Risk management is the
should be taken to reduce risk to an acceptable level, based on the value of information
Risk is the possibility that something bad will happen that will cause harm to a data
resource (or asset loss). Vulnerability is a vulnerability that could be used to place a data
9
resource at risk or cause harm. A risk is anything that has the potential to cause harm
(manmade or act of nature). It has an effect on the probability that a threat will use a
SYSTEM
Protection of data uses cryptography to turn usable information into a form that makes it
useless by anyone other than an authorized user; this process is called encryption. Data
that has been encrypted (rendered unusable) can be converted back to its original usable
form through the decryption process by an authorized user who owns the cryptographic
10
2.6 SUMMARY OF LITERATURE REVIEW
Date
1 Ukoji Vitus The Aim is to Qualitative data comprising The result of this paper
Nwankwo, study the Crime lethal and non-lethal crimes shows available evidence
(2016). history in are sourced from the Trent from the Trent Online
operational
2 Fowzi Jamal Development of a The development was done The outcome of the
11
record criminals in data
3 (O. Awodele, A real-time crime The model used follows a The system portrays a
Oluwawunmi national security phase begins. This system objective of making it user
intensive documentation
12
Pickett states. with 500 American has a net benefit.
corporations among
universities.
5 Oyetunji, M.O., Infusion of ICT This study made use of After distribution of the
Oladeji, F.A., into Nigerian structured questionnaire for questionnaires among the
Falana, O.J. & Security Sector the purpose of eliciting security personnel selected
Idowu, P.A, information about the ICT from NPF and SSS, 120
13
Force (NPF) and State laptops/desktops, CCTV,
information of the
respondents in order to
agencies selected
14
Fernandes, Management and transactions that the Database Management
abstraction. Occasional,
non-knowledgeable users
programming tends to
connectivity
15
understanding at outcome of complying with also provides a standard
to an agency’s information
implementing controls.
16
8 HOWELL ALIGNING methodology that was The result of this paper
SMITH employed in the study explores on records
RECORDS
ASAVA, includes the study design, management and trends in
MANAGEMEN
population of the study, the Ministry Of Lands and
(2009)
T WITH ICT Sampling and Sampling to assess the contribution of
Technique, data collection Automation of Records
instruments and procedures Management in the
as well as data analysis. Ministry of Lands
17
9 Prakruthi the web-based the CRS offers the police to The online crime reporting
Prakasha, describe the detail and system has been developed
criminal record
simultaneously attach the to override the problems
(2018) system (CRS)
images or multimedia files prevailing in the practicing
aims to use manual system. This
software is supported to
mobile devices in
eliminate in some cases
place of
reducing the hardships
traditional GPS faced by the existing system
devices in order
to facilitate the
police to record
the location of
the committed
crime.
18
CHAPTER THREE
The existing system is manually carried out where information is stored in an office file.
Their personal data are being collected and each person has a file created for him or her.
Search on these files takes time. One has to go through the whole files in search of a
particular record. This is cumbersome, hence the need for the computerization of the
system.
19
Different methods adopted in the collection and gathering Data and Information for the
INTERVIEW METHOD: This was done between the researcher and the Nigerian police
authorities. Reliable facts were gotten based on the questions posed to them by the
researcher.
studied and a lot of information concerning the system in question was obtained. Some
forms that are necessary and available were assessed. Also, internet downloads were
20
INSPECTOR GENERAL OF POLICE
AIG ZONE 1 AIG ZONE 2 AIG ZONE 6 AIG ZONE 3 AIG ZONE 4 AIG ZONE 5
21
3.3 OBJECTIVES OF EXISTING SYSTEM
These consist of the input analysis, process analysis and output analysis which are further
explained as follows;
INPUT ANALYSIS: The input to the system is the security information form. This form
is used for recording crime records, this forms the input to the system.
meaningful format for entry into the system. These personnel data are processed to find
22
OUTPUT ANALYSIS: The output from the system is generated from the system inputs.
DATABASE ADMINISTRATOR
DATABASE ADMINISTRATOR &
AND DATABASE MANAGER
DATABASE MANAGER
IG OF POLICE
I.G OF POLICE
AIG OFOF
AIG POLICE IN IN
POLICE THE ZONE
THE
ZONE
COMMISSIONER OF POLICE
OTHER OFFICERS
OTHER OFFICERS
23
3.5 PROBLEM OF THE CURRENT SYSTEM
The new system will help to solve all the problems inherent in the existing system. The
24
CHAPTER FOUR
4.1 INTRODUCTION
These section reviews the result of the developed system with the major role of output
and input specification and design. Where input specification and design are categorised
on inputs while output specification and design are based on outputs of the system.
Output specification and design: The output design was based on the inputs. The report
generated gives a meaningful report to the management. The system designed generated
1. Crime Report
2. Criminal record
25
Fig: 4.1 Crime Report Output result
26
Fig: 4.2 Criminal Record Output Result
Input design and specification: Computer is designed in such a way that sometimes it is
call GIGO – denoting that what goes in is what comes out. The input forms are designs
generally based on the necessary data that needs to be entered into the system. The data are
captured through the keyboard and stored on a magnetic disk in an access database. The
new system is composed mainly of two input forms, they are the figures below;
27
Fig: 4.3 New Criminal record Input Form
28
Fig: 4.4 New Crime Record Input Form
The input to the system is stored in a database file. The design of file takes the format
below.
Name Text 40
Height Text 10
Complexion Text 10
Nationality Text 50
Image jpeg 5
Crime Text 20
30
Title Text 40
Entered By Text 20
Main Menu
31
Fig 4.5 Use case diagram
32
33
Start
Enter Password
No
Valid
Password?
Yes
Select Menu
Options
Option Yes
A
Information?
No
Yes Print
Option
Reports
Report?
No
Yes
Option
Search
Search?
Record
No
Stop
Fig 4.6 Program
flowchart
34
A
No
No
No
Main Menu
35
CHAPTER FIVE
5.1 SUMMARY
The relationship between the police and the society is a complicated and ever-evolving
one, therefore its very crucial to the police to evolve as the society does. The use of
computerized information system should be adopted like the crime report management
system that has been developed. The use of manual documentation has many setbacks.
Records that has been files or kept for many years could be damaged or lost if a disaster
5.2 CONCLUSION
The main aim of the project was to develop a crime report management system. Which
would enable the Nigerian police keep records of criminals and crime in a database to
gain easy access to it regardless of the location. With this the appropriate body in need of
any criminal report can be gotten easily with the use of the crime report management
system. The delay of passing criminal records from state to state manually has been
mitigated.
36
5.3 RECOMMENDATIONS
For the various advantages of this project, it is recommended that this system should
system. Also, Nigeria police should schedule out advance computer training for better
operation of system such as this. The police department of Nigeria should embrace
37
REFERENCES
1. Farmer, Lindsay: "Crime, definitions of", in Cane and Conoghan (editors), The New
real-time crime records management system for national security agencies,” European
2015.
for the Nigerian Security Sector,” Journal of Digital Innovations and Contempt Res.
Criminal Record System Using Mobile Device for recording criminals,” International
Journal of Research and Scientific Innovation (IJRSI), Vol. 5, No. 5, pp. 1-16, 2018.
38