100% found this document useful (1 vote)
800 views9 pages

Wachemo University School of Computing and Informatics Department of Computer Science Technical Report Writing Assignment Proposal

This document proposes the development of a Citizen Identification Information Management System for Ethiopia. It outlines the need for such a system due to problems with the current manual ID system, including that it is time-consuming and lacks security. The objectives of the proposed system are to gather requirements, analyze needs, design, implement, test, and deploy a web-based system to securely manage citizen information nationwide. A literature review discusses technical aspects and perceived benefits of citizen ID systems. The methodology will include primary data collection through interviews and surveys, as well as secondary research.

Uploaded by

Abe Berhie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
800 views9 pages

Wachemo University School of Computing and Informatics Department of Computer Science Technical Report Writing Assignment Proposal

This document proposes the development of a Citizen Identification Information Management System for Ethiopia. It outlines the need for such a system due to problems with the current manual ID system, including that it is time-consuming and lacks security. The objectives of the proposed system are to gather requirements, analyze needs, design, implement, test, and deploy a web-based system to securely manage citizen information nationwide. A literature review discusses technical aspects and perceived benefits of citizen ID systems. The methodology will include primary data collection through interviews and surveys, as well as secondary research.

Uploaded by

Abe Berhie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

WACHEMO UNIVERSITY

SCHOOL OF COMPUTING AND INFORMATICS

DEPARTMENT OF COMPUTER SCIENCE

TECHNICAL REPORT WRITING ASSIGNMENT PROPOSAL

ON

TITLE: - “CITIZEN IDENTIFICATION INFORMATION MANAGEMENT


SYSTEM FOR ETHIOPIA”

SUBMITTED BY: 4th YEAR SECTION “A” STUDENT

NAME ID_NO

ABEBE BERHANU…………………………………………………R/ET-5378/09

SUBMITTED TO: Mrs. SARA M.

February, 2020

Hossana, Ethiopia
Table of Contents
CHAPTER ONE..............................................................................................................................1

1.1 Introduction.......................................................................................................................1

1.2 Statement of the Problem..................................................................................................1

1.3 Objective of the Project.....................................................................................................2

1.3.1 General Objective......................................................................................................2

1.3.2 Specific Objectives....................................................................................................2

1.4 Literature Review..............................................................................................................2

1.5 Methodology.....................................................................................................................3

1.5.1 Data Gathering Methods............................................................................................3

1.5.2 Development Methodology.......................................................................................4

1.6 Significance of the Study..................................................................................................4

1.7 Project Schedule and Preliminary Budget............................................................................5

1.7.1 Project Schedule........................................................................................................5

1.7.2 Preliminary Project Budget........................................................................................5

References........................................................................................................................................7

CHAPTER ONE
1.1 Introduction
In many situations citizen’s information is a primary asset in any country and keeping that asset
safe, organized and accessible is the basic one. The demand for acquiring, processing and
distributing data is growing enormously. With this growing demand, the need for secure,
reliable, faster, accessible and efficient storage that result in higher productivity and efficiency is
required as well. The largest growth in most economies is coming from 'information' industries.
The success of such knowledge-based organizations lies in their information systems. It is
important to develop the web based national citizen’s identification and information management

Page | i
system in which the government identifies and manipulates its citizen’s information easily.
Having uniquely identified mechanism for citizens is very essential and important in one
country. Most of the time citizens made many of problem and take fraud processes for their
needs in different governmental sectors in order to get benefit for them. Such in treading process
and other governmental issues related with fraud of their identity card. In order to minimize this
problem, I have to be set and find a solution to overcome the problems .so to solve this problem I
think to design web based Citizens Identification Information System to make available and
manage citizen’s information all over the country that can only be seen and managed by an
authorized CII employee and sectors.

1.2 Statement of the Problem


In our country there is little information and communication Technology (ICT) service and there
is no enough use of technology and servant in the user.as we know our country manual ID
system is issued at the public administration level to the purpose of citizen identification.in the
case of giving the ID there is so many problems citizens to get their ID. the process of
identifying and managing citizens information is difficult which requires plenty of processes
such as getting information and validate the identity of the individual manually, Time consuming
to identify the citizen record and it is not secure, when citizen want to get their ID you must
provide approve paper that checks they are resident of that place or country, and at that time they
consume much more time, cost and there is no secured information about the citizens
information, and it is accessed by anyone who gets in the office, and there is no valid unique
identification for citizens.

1.3 Objective of the Project


1.3.1 General Objective
The general objective of this project is to develop a system for Citizen Identification Information
Management System for Ethiopia

1.3.2 Specific Objectives


To achieve the major objective of the proposed project, the following specific objectives are set.

 To gather requirements relevant to development of the project from existing system


 To analyze the requirement of the system under development
Page | ii
 To design the system based on specified requirements in the analysis phase
 To implement the system based on the system design
 To test the system with various testing metrics to verify the system is implemented with
all the required functionalities
 To deploy the system in the working environment

1.4 Literature Review


Many papers about citizen identification system said that “Technically, citizen identification
systems are quite straightforward as they all follow the concept of trust management
systems[ CITATION Bla03 \l 1033 ] that they share with e.g. access cards or credit cards. While
several architectures may exist, they usually follow the same pattern: a central database and
‘identity cards’ that are issued to citizens. Variations are related to the location and content of the
database (or several distributed yet cross-linked databases), the content and technology of the
card (size, security), communication architecture etc.

Similarly, processes supported by such system are not much different from credit or loyalty card
schemes. During the enrolment process an individual receives the card that can be subsequently
used at participating points to obtain access to goods or services. Such processes well support
what is seen as the main purpose of the citizen identification system: to improve assurance of
citizen’s identity in their dealings with the state.

This relatively narrow definition of the purpose of such a system makes it particularly irrelevant
to the rich experience individuals are having with their identities. The system does not cater for
group identity (in fact, it does not cater for an identity of anyone else than the individual, be it
business, government agency or charity organization). Furthermore, it does not allow for the
maintenance of several presentations, the subject that deserves separate discussion. It is also not
directly concerned with entitlements, even though there is a strong tendency to link the database
with a repository of deontic rules related to the citizen, in the form of obligations (e.g. the citizen
has to pay taxes) and entitlements (e.g. the citizen can use the health care system).

There are certain perceived social benefits of a citizen identification system, yet countries differ
in realizing them. Such a system is believed to significantly improve the efficiency of service
delivery, decrease the overall cost, improve border control, simplify everyday experience in

Page | iii
contacts with a variety of institutions etc. While its ability to contain terrorist attacks is
questioned, the usefulness of a good citizen identification system should not be overlooked.
Some countries have significantly benefited from the centralized identification of its citizens,
while several countries have already introduced or are considering an introduction of such
systems. However, within the EU, there is very limited trust in institutions that administer such
scheme[ CITATION Bac07 \l 1033 ].

From the information security perspective, a personal identification system may be considered to
be a rather risky proposition. As the central database is the most vulnerable part of the system
and assuming the operational lifespan of information within the system of 80 years (i.e. the life
expectancy of the citizen), incentives to share and to attack are enormous to the extent that one
can assume that the database will be compromised during this time, regardless of technical
countermeasures taken”.

1.5 Methodology
1.5.1 Data Gathering Methods
Data collection is one of the most important tasks which must be carried out to gather
requirements (user needs) from the existing system so as to develop any software. The data used
for the purpose of developing the system will be obtained from different sources. In gathering
data and information needed from the development of the system, two major fact-finding
techniques will be used in this project work: Primary and Secondary Sources.

a. Primary Sources: Interview and questionnaires will be employed as source of collecting


original data in which the developers made use of empirical approach.

Interview: I interview some public administration employees and some other residents by asking
the process generally how citizens get their residence ID card as the residents says they get their
ID first we proof they are resident of that place and gain the proof paper from their kebele and
after they gain the approval paper they go to public administration to gain the ID card

Observation: Other than interview I have used observation techniques, how citizens get their ID
card from the Public administration. And I have seen many processes when their id gained.

Page | iv
b. Secondary Sources: The secondary data will be obtained from document analysis and the
Internet.

Document Analysis: Manually gathered files will be analyzed for collecting and specifying user
requirements. The analysis of information available from published literatures on the Internet
will be more appropriate to gather user requirements.

1.5.2 Development Methodology


Among the different development methodologies available, I am using object-oriented
methodologies for the analysis and design of my system. Object oriented methodology enables
me to represent complex relations among different objects and represent data and process with
consistent notation throughout the system. An important feature such as inheritance,
polymorphism, data hiding and encapsulation suits the design very well.

1.6 Significance of the Study


Table 1 Expected Benefits and Beneficiaries

The beneficiaries and How the system


benefits
No Project benefits Government Citizens
1. Saving time to get an It gives satisfaction Citizens can use their
identification card. for its citizens. want.
2. Saving time to get Automatically and When citizens want
citizens' information. correct information to show information,
can gain in short we can access freely
period of time. in short time.
3. Improve the security It can access data Citizens can protect
of the country. securely and give and keeps their right.
service for citizens
correctly.

1.7 Project Schedule and Preliminary Budget


1.7.1 Project Schedule
Table 2 Time Schedule for the Project

Phase Tasks to be included Begin date End date Duration of time

Page | v
1st Phase Requirement gathering Jan 25 2020 Feb 7 2020 13 days

2nd Phase SRS Feb 8 2010 Feb 15 2020 8 days

3rd Phase Software Design Description Feb 16 2020 Feb 30 2020 15 days

5th
Phase Implementation Mar 10 2020 May 27 2020 47 days

5th Phase Unit and system testing May 28 2020 May 6 2020 8 days

1.7.2 Preliminary Project Budget


Any software development project has three major types of costs: the hardware, the software and
the human resource costs.

Table 3 Budget of the Proposed System

A. Infrastructure Cost

Description Quantity Per Unit Cost Total Cost

1. Computer 1 15,000 15,000 ETB

2. Internet Connection hired for testing - Free Free

Total Infrastructure 15,000 ETB

B. Software And Operating System Licenses

Description Quantity Per Unit Cost Total Cost

1. Windows 7, 8, or 10 Operating

System
Free Free Free
2. XAMPP Bundled software Free Free Free

3. Net Beans IDE & Notepad++ Free Free Free

Page | vi
Total Software and Operating System Licenses Free

C. Other Project Costs

Description Quantity Per Unit Cost Total Cost

1. Paper 1 dozen - 100ETB

2. Pens 1 dozen - 100ETB

3. USB Flash 2(8GB) 210 420ETB

Total Other Project Costs 620ETB

Total Project Estimated Cost Less Contingency 420ETB

Contingency (25%) 3500ETB

Total Project Estimated Cost Including Contingency 6455ETB

References

[1] Blaze M. , Ioannidis J. ,Keromytis AD., "Experience with the keynote trust management
system," 2003.
[2] Backhouse J. & Halperin R., "A Survey on EU Citizen’s Trust in ID systems and authorities.
FIDIS Journal," 2007.

Page | vii
Page | viii

You might also like