PROJECT Crime Management Information Systems

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 38

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF STUDY

Scholars and social analysts have defined crime from different perspectives. As such,

a general definition of the concept has eluded the academia for years. While (Farmer

Lindsay, 2008) see crime as a category created by law, (Elizabeth A. Martin, 2003)

provided a more comprehensive definition when she noted that crime or offence (or

criminal offence) is an act harmful not only to some individual or individuals but also

to a community, society or the state ("a public wrong"). It refers to actions that are

forbidden by law; offence against the state, conducts such as committing murder,

stealing property, resisting arrest, driving while under the influence of alcohol and

possessing or selling illegal drugs18 and seen as an act that violates a political or

moral rule; an act of a single individual acting from personal motive.

The present world is technology driven as it is employed by many fields in the

performance of their operation. In the case of law enforcement agencies, this is

evident in the use of automated crime record management systems (CRMS)

worldwide to keep record of crime and criminals involved. Crime being an act

against the law of a society is a threat to the well-being of the populace and so,

requires efficient and effective monitoring. For this reason, CRMS have been
1
developed to achieve this purpose. However, in Nigeria, the CRMS employed is

majorly manual, which is, the use of pen and paper (O. Awodele, O. Ernest, O. A.

Olufunmike, S. O. Oluwawunmi and U. A. Anita, 2015).

The project Criminal Record Management System in the perspective of Nigeria is a

Criminal record management system that is used to record crime activities of

criminals. This project is mainly useful for law and enforcement agencies in Nigeria.

The law and enforcement authority can preserve records of the criminals and search

any criminal using the system. This is an online web application with database

system in which police will keep the record of criminals who have been arrested. We

have used HTML, JavaScript, CSS, PHP, MySql and Bootstrap to develop this

project. The project’s interface is very user friendly and helpful for authority.

1.2 STATEMENT OF PROBLEM

Manual documentation of crime record can lead to exposure and loss of the information,

also the delay during transfer of these records from one department to another. Hence,

there is need for an automated crime record management system to guaranty safety of

information.

2
1.3 MOTIVATION OF STUDY

I realised that the Nigerian police are still making use of manual documentation to record

criminal information as such its impossible for a Nigerian police officer in a state to have

access to criminal record of another state. And the rigorous stress that comes with

transferring hardcopy records from one state to another. During which the confidentiality

of the documented could be altered by anyone that might come in contact with it without

prior authorization to do so. This motivated me to come up with a web-based crime report

management system that could be accessed from anywhere in the world with proper

authentication as a police officer.

1.4 AIMS AND OBJECTIVES

The Aim of the project is to design and develop a system for Crime record management.

The aims would be achieved with the following objectives:

I. To design a software for managing crime Report.

II. To develop the designed system.

III. To evaluate the performance of the developed system.

3
1.5 SCOPE AND LIMITATION OF STUDY

The project involves software development of a crime report management system using a

waterfall model that communicates with the database. The following are the scope

concern,

I. Web application based.

II. SQL database.

III. Waterfall method of software development.

IV. Will only accept images and text record.

V. Cannot accept biometric records.

1.6 SIGNIFICANCE OF STUDY

This project is a combination of record keeping and programming. Its successful

implementation would help a whole lot specifically the Nigerian police force, this project

would be of good use to them allowing them to have quick and easy access to criminal

records from anywhere in the world.

The following are the advantageous significance of this project.

1. Saving the Nigerian police force the delay of manual documentation.

2. Saving the Nigerian police force the cost of buying papers and files.

3. Saving the Nigerian police, the stress of searching for crime records manually.
4
1.7 DEFINITION OF TERMS AND VARIABLES

Policing: Policing is another way of depicting the police.

Anti-policing: Anti-policing is the society’s social attitude opposed to war between states

and in particular countering arguments based on policies.

Databases: A systematically arranged collection of computer data, structured so that it

can be automatically retrieved or manipulated. It is also called a databank.

National Security: The requirement to maintain the survival of the nation-state through

the use of economic, policing, and political power and the exercise of diplomacy.

Information Security: Means protecting information and information systems from

unauthorized access, use, disclosure, disruption, modification, perusal, inspection,

recording, or destruction.

Classified Information: Is sensitive information to which the access is restricted by law

or regulation to particular groups of persons.

Security Management: Is a broad field of management related to asset management,

physical security and human resource safety functions.


5
CHAPTER TWO

6
LITERATURE REVIEW

2.1 CIA AS INFORMATION SECURITY WATCHWORD

Over recent years, the field of information security has expanded and developed

substantially. There are many ways to gain entry as a professional into the industry. It

offers many specialization areas including: security networks and related infrastructure,

securing applications and databases, security testing, auditing of information systems,

planning of business continuity and science of digital forensics, etc. For over twenty

years, information security has held confidentiality, integrity and availability (known as

the CIA triad) to be the core principles of information security. Extending this classic trio

is an ongoing debate. Other principles such as Accountability have sometimes been

suggested for addition-it has been pointed out that issues such as Nonrepudiation do not

fit well within the t three core concepts, and as computer system regulation has increased

(especially among Western nations).

2.2 SECURITY INFORMATION SYSTEM

Security is the degree to which danger, damage, failure and crime are protected. Security

as a form of protection is a condition for structures and processes that provide or improve

security. The Institution for Security and Open Methodologies, 2003 (ISECOM) in the

OSSTMM 3 defines security as a “form of protection where a separation is created

7
between the assets and the threat”. This includes but is not limited to the elimination of

either the asset or the threat (Institution for Security and Open Methodologies, OSSTMM

2003).

Safety has to be contrasted with related concepts: safety, stability and reliability, the key

difference between safety and reliability is that protection has to take into account the

actions of people trying to destroy. The background in which protection is preserved is

also provided by different scenarios. As far as sensitive material is concerned, the

situation prevents unauthorized persons from having access to official information that is

safeguarding in the interest of the national security. Measures taken by a police unit, an

activity or installation to protect itself against all acts designed to, or which may, impair

its effectiveness.

Perception of security may be poorly mapped to measurable objective security. For

example, the fear of earthquakes has been reported to be more common than the fear of

slipping on the bathroom floor although the latter kills more people than the former.

Similarly, the perceived effectiveness of security measures is sometimes different from

the actual security provided by those measures. The presence of security protection may

even be taken for security itself. For example, two computer security programs could be

interfering with each other and even cancelling each other’s effect while the owner

believes he/she is getting double of the protection.

8
2.3 INFORMATION SECURITY

Information security involves the privacy, reliability and availability, and the proper

functioning of a computer system without regard for the data that the computer has stored

or processed. Governments, police, businesses, financial institutions, hospitals and private

companies collect a lot of confidential information about their staff, clients, goods,

analysis and financial status. Most of this information is now collected, processed and

stored on electronic computers and transmitted across networks to other computers.

2.4 RISK MANAGEMENT IN INFORMATION SECURITY

A comprehensive approach to the subject of risk management, some specific terminology

and a widely used risk management system will be presented (CISA Review manual

(2006)) provide the following risk management description. Risk management is the

process of determining vulnerabilities and risks to information assets used by an

organization to achieve business objectives and to decide which countermeasures, if any,

should be taken to reduce risk to an acceptable level, based on the value of information

resources to the organization.

Risk is the possibility that something bad will happen that will cause harm to a data

resource (or asset loss). Vulnerability is a vulnerability that could be used to place a data
9
resource at risk or cause harm. A risk is anything that has the potential to cause harm

(manmade or act of nature). It has an effect on the probability that a threat will use a

weakness to cause harm.

2.5 THE RELEVANCE OF CRYPTOGRAPHY TO SECURITY

SYSTEM

Protection of data uses cryptography to turn usable information into a form that makes it

useless by anyone other than an authorized user; this process is called encryption. Data

that has been encrypted (rendered unusable) can be converted back to its original usable

form through the decryption process by an authorized user who owns the cryptographic

key. In information security, cryptography is used to shield information from unwanted or

unintentional disclosure during transit (electronically or physically) and storage of

information. Cryptography provides security of data with other useful applications,

including enhanced methods of encryption, digest messages, digital signature, non-

repudiation, and encrypted network communications.

10
2.6 SUMMARY OF LITERATURE REVIEW

S/N Names of Aim of research Method of data collection Result

Author and and analysis

Date

1 Ukoji Vitus The Aim is to Qualitative data comprising The result of this paper

Nwankwo, study the Crime lethal and non-lethal crimes shows available evidence

(2016). history in are sourced from the Trent from the Trent Online

Nigeria. website at database reveals that the

www.thetrentonline.com following violent and

through the CRIME section nonviolent crimes exist in

Nigeria with different

scales of violent incidents

since 2013 when it became

operational

2 Fowzi Jamal Development of a The development was done The outcome of the

Mohamed record considering waterfall analysed data of this

Barrow, (2019). management methodology. application has different

system features like police can

11
record criminals in data

base, also can view the

details of the criminals.

3 (O. Awodele, A real-time crime The model used follows a The system portrays a

O. Ernest, O. A. records sequential order which simple and highly

Olufunmike, S. management ensures that a phase is interactive design,

O. system for completed before another accomplishing the set

Oluwawunmi national security phase begins. This system objective of making it user

and U. A. agencies model emphasizes planning friendly. It also allows

Anita, (2015). in early stages, is used in enhanced access to

projects where all the comprehensive, reliable

system requirements are and accurate information.

known and in addition, its

intensive documentation

and planning make it work.

4 M. Denver, S. A survey on A survey of the United The result of this paper

D. Bushway criminal records States by the Computer reviles that if evidence

and Justin T and employment Security Institute in accumulates that delaying

in the united conjunction with the FBI criminal record inquiries

12
Pickett states. with 500 American has a net benefit.

corporations among

(2018) financial institutions,

government agencies, and

universities.

5 Oyetunji, M.O., Infusion of ICT This study made use of After distribution of the

Oladeji, F.A., into Nigerian structured questionnaire for questionnaires among the

Falana, O.J. & Security Sector the purpose of eliciting security personnel selected

Idowu, P.A, information about the ICT from NPF and SSS, 120

(2017) devices used in by Nigerian responses were received

security personnel, how out of the 150

many people used the questionnaires distributed.

resources and for how long Based on the findings of

the IT devices had been in this study, the ICT tools

use among the respondents investigated among the

considered for the study. 120 respondents chosen

The study considered for this study were:

respondents selected from smartphones, SMS, e-

two (2) security agencies, mails,

namely: Nigerian Police cameras/microphones,

13
Force (NPF) and State laptops/desktops, CCTV,

Security Service (SSS) RFID, search engines,

located in south-western websites, instant

part of Nigeria messaging and social

networks. Following the

results of the demographic

information of the

respondents in order to

identify those that make

use of these ICT tools

within the Nigerian

security sector, it was

observed that there were

more male users (70% of

respondents) than there

were female users (30%)

of ICT tools working in

the Nigerian security

agencies selected

6 Alvaro A A Database Applications send queries The added-value that

14
Fernandes, Management and transactions that the Database Management

(2013) Systems DBMS converts into OLTP Sytem deliver to

tuple-based operations over organizations stems from

the data store controlled use of

abstraction. Occasional,

non-knowledgeable users

are served by graphical

user interfaces (GUI),

which are often form-

based Most application

programming tends to

benefit from database

connectivity

7 Australian The Australian This manual uses a Documenting information

Government Government framework to present security risk management

Information information in a consistent activities can help an

Information Security Manual manner. The framework agency ensure security

Security (ISM) provide consists of a number of risks are managed in a

Manual, (2015) greater headings in each section: • coordinated and consistent

accessibility and Objective—the desired manner. Documentation

15
understanding at outcome of complying with also provides a standard

all levels of the controls specified in the against which compliance

government. This section, expressed as if the can be measured

Controls outcome has already been

document details achieved • Scope and

the technical Context—the scope and

security controls applicability of the section.

which can be It can also include

implemented to definitions, legislative

help mitigate context, related ISM

security risks to sections and background

agencies’ information • Controls—

information and procedures with associated

systems. compliance requirements

for mitigating security risks

to an agency’s information

and systems • References—

sources of information that

can assist in interpreting or

implementing controls.

16
8 HOWELL ALIGNING methodology that was The result of this paper
SMITH employed in the study explores on records
RECORDS
ASAVA, includes the study design, management and trends in
MANAGEMEN
population of the study, the Ministry Of Lands and
(2009)
T WITH ICT Sampling and Sampling to assess the contribution of
Technique, data collection Automation of Records
instruments and procedures Management in the
as well as data analysis. Ministry of Lands

17
9 Prakruthi the web-based the CRS offers the police to The online crime reporting
Prakasha, describe the detail and system has been developed
criminal record
simultaneously attach the to override the problems
(2018) system (CRS)
images or multimedia files prevailing in the practicing
aims to use manual system. This
software is supported to
mobile devices in
eliminate in some cases
place of
reducing the hardships
traditional GPS faced by the existing system

devices in order

to facilitate the

police to record

the location of

the committed

crime.

18
CHAPTER THREE

MATERIAL AND SYSTEM DESIGN

3.1 METHODOLOGY AND ANALYSIS

The existing system is manually carried out where information is stored in an office file.

Their personal data are being collected and each person has a file created for him or her.

Search on these files takes time. One has to go through the whole files in search of a

particular record. This is cumbersome, hence the need for the computerization of the

system.

3.2 FACTS FINDING METHOD

19
Different methods adopted in the collection and gathering Data and Information for the

project include, interview, Reference, and written texts.

INTERVIEW METHOD: This was done between the researcher and the Nigerian police

authorities. Reliable facts were gotten based on the questions posed to them by the

researcher.

REFERENCE TO WRITTEN TEXT: Security information documentations were

studied and a lot of information concerning the system in question was obtained. Some

forms that are necessary and available were assessed. Also, internet downloads were

made to obtain some text materials.

20
INSPECTOR GENERAL OF POLICE

AIG ZONE 1 AIG ZONE 2 AIG ZONE 6 AIG ZONE 3 AIG ZONE 4 AIG ZONE 5

POLICE POLICE POLICE POLICE POLICE


COMMISSIONER COMMISSIONER COMMISSIONER COMMISSIONER COMMISSIONER
ENUGU STATE ANAMBRASTATE ABIA STATE IMO SATE EBONYISATE

ASSISTANT DEPUTY POLICE DEPUTY POLICE


COMMISSIONER OF COMMISSIONER COMMISSIONER (CRIME)
POLICE

OTHER OFFICERS DIVISIONAL POLICE DIVISIONAL OFFICER IN


OFFICER COMMAND

Fig: 3.1 Organizational structure

21
3.3 OBJECTIVES OF EXISTING SYSTEM

The objective of the existing system includes:

 Collection of police personnel record.

 Collection of crime report.

 Opening a file for documenting this information.

 Performing manual search on the file cabinet to retrieve information.

3.4 INPUT, PROCESS AND OUTPUT ANALYSIS

These consist of the input analysis, process analysis and output analysis which are further

explained as follows;

INPUT ANALYSIS: The input to the system is the security information form. This form

is used for recording crime records, this forms the input to the system.

PROCESS ANALYSIS: The information gathered was processed into a more

meaningful format for entry into the system. These personnel data are processed to find

out their areas of specialization and criminal information sent out.

22
OUTPUT ANALYSIS: The output from the system is generated from the system inputs.

More of the output generated is on criminal record.

DATABASE ADMINISTRATOR
DATABASE ADMINISTRATOR &
AND DATABASE MANAGER
DATABASE MANAGER

IG OF POLICE
I.G OF POLICE

AIG OFOF
AIG POLICE IN IN
POLICE THE ZONE
THE
ZONE

COMMISSIONER OF POLICE

OTHER OFFICERS
OTHER OFFICERS

Fig 3.2 Flow chart for information

23
3.5 PROBLEM OF THE CURRENT SYSTEM

Manual system of operation faces a lot of challenges which are as follows;

i. Delay in data processing

ii. Errors in processing

iii. Loss of materials to fire incidents, termites / on transit

iv. Insecurity of data

3.6 JUSTIFICATION FOR THE NEW SYSTEM

The new system will help to solve all the problems inherent in the existing system. The

justification for the new system includes:

Timely processing of security information

Error free processing of data

Security of information is guaranteed

24
CHAPTER FOUR

RESULT AND DISCUSSION

4.1 INTRODUCTION

These section reviews the result of the developed system with the major role of output

and input specification and design. Where input specification and design are categorised

on inputs while output specification and design are based on outputs of the system.

Output specification and design: The output design was based on the inputs. The report

generated gives a meaningful report to the management. The system designed generated

the following reports;

1. Crime Report

2. Criminal record

These outputs can be generated as softcopy or printed in hard.

25
Fig: 4.1 Crime Report Output result

26
Fig: 4.2 Criminal Record Output Result

Input design and specification: Computer is designed in such a way that sometimes it is

call GIGO – denoting that what goes in is what comes out. The input forms are designs

generally based on the necessary data that needs to be entered into the system. The data are

captured through the keyboard and stored on a magnetic disk in an access database. The

new system is composed mainly of two input forms, they are the figures below;

27
Fig: 4.3 New Criminal record Input Form

28
Fig: 4.4 New Crime Record Input Form

4.2 FILE DESIGN

The input to the system is stored in a database file. The design of file takes the format

below.

Field Name Data Type Size

Name Text 40

Gender Text 100


29
Date of Birth Date\Time 8

Year of crime Date\Time 10

Crime Committed Text 500

Hair Colour Text 20

Height Text 10

Complexion Text 10

Residence Address Text 50

Residence City Text 50

Residence State Text 30

State of origin Text 50

Nationality Text 50

Image jpeg 5

Table 4.1 structure for file “criminal record”

Field Name Data Type Size

Crime Text 20
30
Title Text 40

Description Text 1000

Entered By Text 20

Table 4.2 Structure for file “crime record”

Main Menu

Information Query Report Help Exit

Criminal Search by Crime Criminal Users


Report Guide
information
Search By
Criminal
Crime
Crime About The
Report Software
Search By
Exit Area

31
Fig 4.5 Use case diagram

4.3 SYSTEM REQUIREMENT

The requirements needed to implement this system are as follows:

Hardware Requirement: The hardware requirement are as follows;

I. Pentium IV System or higher version.

II. The Random-access memory (RAM) should be at least 1GB.

III. Enhanced keyboard.

IV. At least 20GB hard disk.

V. E.G.A/V.G. A, a coloured monitor.

Software requirement: The software requirements are as follows;

I. A window 98 or higher version for faster processing

II. Microsoft Access

III. Microsoft Visual Studio 2010

32
33
Start

Enter Password

No
Valid
Password?

Yes

Select Menu
Options

Option Yes
A
Information?

No

Yes Print
Option
Reports
Report?

No

Yes
Option
Search
Search?
Record
No

Stop
Fig 4.6 Program

flowchart

34
A

Select Option from The


sub menu

Yes Enter Criminal


Criminal?
Record

No

Yes Enter Crimes Record


Crimes

No

Search the record


Search? Yes

No

Main Menu

Fig 4.7 Program flow chart continue

35
CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATIONS

5.1 SUMMARY

The relationship between the police and the society is a complicated and ever-evolving

one, therefore its very crucial to the police to evolve as the society does. The use of

computerized information system should be adopted like the crime report management

system that has been developed. The use of manual documentation has many setbacks.

Records that has been files or kept for many years could be damaged or lost if a disaster

occurs such as fire and earthquake.

5.2 CONCLUSION

The main aim of the project was to develop a crime report management system. Which

would enable the Nigerian police keep records of criminals and crime in a database to

gain easy access to it regardless of the location. With this the appropriate body in need of

any criminal report can be gotten easily with the use of the crime report management

system. The delay of passing criminal records from state to state manually has been

mitigated.

36
5.3 RECOMMENDATIONS

For the various advantages of this project, it is recommended that this system should

be implemented by Nigeria police to enable them go into computerized information

system. Also, Nigeria police should schedule out advance computer training for better

operation of system such as this. The police department of Nigeria should embrace

technology to make our country a safer place to be.

37
REFERENCES

1. Farmer, Lindsay: "Crime, definitions of", in Cane and Conoghan (editors), The New

Oxford Companion to Law, Oxford University Press, 2008 (ISBN 978-0-19-929054-

3), page 263 (Google Books).

2. Elizabeth A. Martin (2003). Oxford Dictionary of Law (7 ed.). Oxford: Oxford

University Press. ISBN 0198607563

3. O. Awodele, O. Ernest, O. A. Olufunmike, S. O. Oluwawunmi and U. A. Anita, “A

real-time crime records management system for national security agencies,” European

Journal of Computer Science and Information Technology, Vol. 3, No. 2, pp.1-12,

2015.

4. (Institution for Security and Open Methodologies, OSSTMM 2003).

5. M. O. Oyetunji, F. A. Oladeji, O. J. Falana, and P. A. Idowu, “An ICT Infusion Model

for the Nigerian Security Sector,” Journal of Digital Innovations and Contempt Res.

in Science and Engineering, Vol. 5, No. 1, pp. 101-120, 2017.

6. P. Prakasha, Veekshitha, R. Rashmitha, S. D. Dinesh and Shilpa, “A Web-based

Criminal Record System Using Mobile Device for recording criminals,” International

Journal of Research and Scientific Innovation (IJRSI), Vol. 5, No. 5, pp. 1-16, 2018.

7. CISA Review manual, 2006

38

You might also like