Wachemo University School of Computing and Informatics Department of Computer Science Technical Report Writing Assignment Proposal
Wachemo University School of Computing and Informatics Department of Computer Science Technical Report Writing Assignment Proposal
ON
NAME ID_NO
ABEBE BERHANU…………………………………………………R/ET-5378/09
February, 2020
Hossana, Ethiopia
Table of Contents
CHAPTER ONE..............................................................................................................................1
1.1 Introduction.......................................................................................................................1
1.5 Methodology.....................................................................................................................3
References........................................................................................................................................7
CHAPTER ONE
1.1 Introduction
In many situations citizen’s information is a primary asset in any country and keeping that asset
safe, organized and accessible is the basic one. The demand for acquiring, processing and
distributing data is growing enormously. With this growing demand, the need for secure,
reliable, faster, accessible and efficient storage that result in higher productivity and efficiency is
required as well. The largest growth in most economies is coming from 'information' industries.
The success of such knowledge-based organizations lies in their information systems. It is
important to develop the web based national citizen’s identification and information management
Page | i
system in which the government identifies and manipulates its citizen’s information easily.
Having uniquely identified mechanism for citizens is very essential and important in one
country. Most of the time citizens made many of problem and take fraud processes for their
needs in different governmental sectors in order to get benefit for them. Such in treading process
and other governmental issues related with fraud of their identity card. In order to minimize this
problem, I have to be set and find a solution to overcome the problems .so to solve this problem I
think to design web based Citizens Identification Information System to make available and
manage citizen’s information all over the country that can only be seen and managed by an
authorized CII employee and sectors.
Similarly, processes supported by such system are not much different from credit or loyalty card
schemes. During the enrolment process an individual receives the card that can be subsequently
used at participating points to obtain access to goods or services. Such processes well support
what is seen as the main purpose of the citizen identification system: to improve assurance of
citizen’s identity in their dealings with the state.
This relatively narrow definition of the purpose of such a system makes it particularly irrelevant
to the rich experience individuals are having with their identities. The system does not cater for
group identity (in fact, it does not cater for an identity of anyone else than the individual, be it
business, government agency or charity organization). Furthermore, it does not allow for the
maintenance of several presentations, the subject that deserves separate discussion. It is also not
directly concerned with entitlements, even though there is a strong tendency to link the database
with a repository of deontic rules related to the citizen, in the form of obligations (e.g. the citizen
has to pay taxes) and entitlements (e.g. the citizen can use the health care system).
There are certain perceived social benefits of a citizen identification system, yet countries differ
in realizing them. Such a system is believed to significantly improve the efficiency of service
delivery, decrease the overall cost, improve border control, simplify everyday experience in
Page | iii
contacts with a variety of institutions etc. While its ability to contain terrorist attacks is
questioned, the usefulness of a good citizen identification system should not be overlooked.
Some countries have significantly benefited from the centralized identification of its citizens,
while several countries have already introduced or are considering an introduction of such
systems. However, within the EU, there is very limited trust in institutions that administer such
scheme[ CITATION Bac07 \l 1033 ].
From the information security perspective, a personal identification system may be considered to
be a rather risky proposition. As the central database is the most vulnerable part of the system
and assuming the operational lifespan of information within the system of 80 years (i.e. the life
expectancy of the citizen), incentives to share and to attack are enormous to the extent that one
can assume that the database will be compromised during this time, regardless of technical
countermeasures taken”.
1.5 Methodology
1.5.1 Data Gathering Methods
Data collection is one of the most important tasks which must be carried out to gather
requirements (user needs) from the existing system so as to develop any software. The data used
for the purpose of developing the system will be obtained from different sources. In gathering
data and information needed from the development of the system, two major fact-finding
techniques will be used in this project work: Primary and Secondary Sources.
Interview: I interview some public administration employees and some other residents by asking
the process generally how citizens get their residence ID card as the residents says they get their
ID first we proof they are resident of that place and gain the proof paper from their kebele and
after they gain the approval paper they go to public administration to gain the ID card
Observation: Other than interview I have used observation techniques, how citizens get their ID
card from the Public administration. And I have seen many processes when their id gained.
Page | iv
b. Secondary Sources: The secondary data will be obtained from document analysis and the
Internet.
Document Analysis: Manually gathered files will be analyzed for collecting and specifying user
requirements. The analysis of information available from published literatures on the Internet
will be more appropriate to gather user requirements.
Page | v
1st Phase Requirement gathering Jan 25 2020 Feb 7 2020 13 days
3rd Phase Software Design Description Feb 16 2020 Feb 30 2020 15 days
5th
Phase Implementation Mar 10 2020 May 27 2020 47 days
5th Phase Unit and system testing May 28 2020 May 6 2020 8 days
A. Infrastructure Cost
1. Windows 7, 8, or 10 Operating
System
Free Free Free
2. XAMPP Bundled software Free Free Free
Page | vi
Total Software and Operating System Licenses Free
References
[1] Blaze M. , Ioannidis J. ,Keromytis AD., "Experience with the keynote trust management
system," 2003.
[2] Backhouse J. & Halperin R., "A Survey on EU Citizen’s Trust in ID systems and authorities.
FIDIS Journal," 2007.
Page | vii
Page | viii