0% found this document useful (0 votes)
369 views41 pages

.NG - 46992.24317 Design and Implementation of Web Based Crime Reporting System

The document discusses the design and implementation of a web-based crime reporting system in Nigeria. It aims to address difficulties with the current manual crime reporting system, such as the lack of anonymity and instant reporting. The proposed system would allow online crime reporting to assist police in obtaining timely information about criminals. It would have modules for data capture, report management, and utilizing crime data. The system aims to strengthen crime reporting and help police reduce criminal activities.

Uploaded by

Manu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
369 views41 pages

.NG - 46992.24317 Design and Implementation of Web Based Crime Reporting System

The document discusses the design and implementation of a web-based crime reporting system in Nigeria. It aims to address difficulties with the current manual crime reporting system, such as the lack of anonymity and instant reporting. The proposed system would allow online crime reporting to assist police in obtaining timely information about criminals. It would have modules for data capture, report management, and utilizing crime data. The system aims to strengthen crime reporting and help police reduce criminal activities.

Uploaded by

Manu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 41

DESIGN AND IMPLEMENTATION OF WEB BASED CRIME

REPORTING SYSTEM
ABSTRACT

Crime is part of human activities and needs to be managed. No human


society has ever been totally free of deviants and it is unlikely that society
will ever be. The more populated and complex a society becomes the wider
the range of antisocial conducts that must be controlled by the government
through the armed forces and other agencies especially the Police Force. The
incident-based system reports on a much broader range of crimes and
includes data on the circumstances of the crime, the victim, and the
defendant. The current crime reporting system is faced with several
difficulties as there is no instant means of reporting crime other than
telephone calls, messaging or perhaps face-to-face which is usually
cumbersome especially where the reporter wishes to keep anonymity. The
proposed crime reporting system aims to assist the Nigerian Police in their
bid to solve crimes with timely and useful information about criminals
and/or their mode of operations so as to nip in the bud criminal activities in a
given locality. Finally, a prototype crime reporting system was designed that
relies on four reporting forms: a complaint or dispatch reporting form, a
crime event report form, follow-up investigation report form, and an arrest
report form. The system consists of three functional modules: a data capture
module, a report management and control module, and a data utilization
module. Future work on crime reporting system can be tailored towards
accessibility (mobile version), awareness and improvement on the usage.
CHAPTER ONE

1.0 INTRODUCTION

Modern society is characterized by increasing levels of global social

mobility and uncertainty relating to levels of risk posed by internal and

external security threats. Within this climate security driven by technology is

increasingly being used by governments, corporate bodies and individuals to

monitor and reduce risk. There has been an acceptance that the criminal

justice system is limited in its capacity to control crime which has led to the

exploration of other avenues for tackling crime and this has provided a

market for private companies to push forward the growth of technological

security innovations. Crime is a human experience and is as old as the

human race. Crime is geographical. It occurs at a specific place, specific

time and for a specific reason. It can affect everyone and anyone at any time.

Both Information Technology (IT) and crime are complex and

constantly changing. Social and technological changes introduce new

targets, tools and motives for crime. E-crime targets include confidential

information, technical infrastructure and denial of service. Improved and

faster technology and worldwide communications make it easier to both

organise and conceal crime. Software to help criminals is available, even as

commercial products: criminals have used attack-testing software to probe


the security of target systems. Motivations now include terrorism and

revenge as well as traditional desires for financial gain.

Terrorists might not be rational in their motivation; casual

opportunists look for an open door; organized crime will evaluate potential

gains against investment – which might be massive if the potential rewards

are attractive enough.

1.1 BACKGROUND OF THE STUDY

Crime reporting is the first of the nine basic Youth Crime Watch

components. Most simply, it's giving the proper authorities information you

have about crime that might be committed, crime that has been committed,

someone who was involved in committing a crime. Young people

understand the importance of reporting crime. They want safer schools and

neighborhoods, and if they know how to report effectively, they'll do it.

Young people can help encourage peers to report crime in the making as

well as information on crimes under investigation.

Online Crime Report System helps in getting the different police

stations to share information and get in contact with one another, the aim of

this project is to develop an online crime reporting and management system

which is easily accessible to the public, the police department and the
administrative department. The crime information dictionary provides a

facility of reporting crime, Searching, different crime ratio and most wanted

criminals online.

With the increase of communication system and management

applications in our day to day life and public service sector developing

online crime reporting system will be a helpful software application. This

application works on web where public and police department can use to get

effective service compare to the existing manual record management

method.

1.2 STATEMENT OF RESEARCH PROBLEM

Crime is part of human activities and needs to be managed. No human

society has ever been totally free of deviants and it is unlikely that society

will ever be. The more populated and complex a society becomes the wider

the range of anti-social conduct that must be controlled by government using

police power. The incident-based system reports on a much broader range of

crimes and includes data on the circumstances of the crime, the victim, and

the defendant. The current crime reporting system is faced with several

difficulties as there is no instant means of reporting crime rather than

telephone calls, messaging or perhaps face-to-face which is always


cumbersome in a case the reporter might want to keep anonymity. To

strengthen crime reporting system, an online system is enhanced to fully

take the responsibility of reporting crime in a manner that will be useful to

the Nigerian Police Force (NPF). For instance, in cases involving property

crime the incident-based system will report on the:

i. Type and description of the article;

ii. Its value;

iii. Type of loss (e.g., stolen, vandalized);

iv. type of victim (e.g., individual, business);

v. And location of crime (e.g., convenience store, residence).

1.3 OBJECTIVES OF THE STUDY

The objective of this research work is centered on the research topic

itself, which is to design and implement a web based application for crime

reporting which will be developed using the web platform tools.

The aim of CRS is to assist the Nigerian Police Force (NPF) in their

bid to solve crimes with timely and useful information about criminals

and/or their mode of operations so as to nip in the bud criminal activities in a

given locality.
Other of its objective are

1. To review what has been done so far relating to this research work.

2. To develop software that will receive and store crime reports.

3. To make the crime records available online to facilitate distribution to

different police stations.

4. To provide a deterministic crime reporting model

5. To create a distributed data warehouse for crime reporting based on

the model.

1.4 SIGNIFICANCE OF THE STUDY

The enhanced data quality of the incident-based reporting system will

be of significant benefit to state and local governing bodies, criminal justice

agencies, and the public. Data from the incident-based system will enhance

both strategic and tactical decision making in criminal justice.

Because incident-based data will provide a more accurate picture of a

community's crime patterns, decisions regarding law enforcement, judicial,

and correctional resources can be made based on empirical data. Similarly,

the level of detail provided by incident-based data can assist law

enforcement agencies and the community to identify crime problems in their

community such as:


i. Crime hotspots

ii. Populations who are at risk and

iii. Drug and alcohol problems.

Crime prevention strategies may then be developed and evaluated

based on empirical evidence. This study will also assist policy analyst to

understand both factors that impedes the efficiency and effectiveness of the

police and the ways by which the situation could be improved upon so as to

bring crime and disorders in the society to its barest minimum. Finally, this

study will go a long way in contributing to the knowledge of police work.

Besides, other researchers and students in higher institutions especially those

in sociology department can derive various secondary data from this study.

1.5 SCOPE OF THE STUDY

This study is a research geared towards correcting the factors affecting

the crime reporting, investigation and correction role of the Nigeria police.

In view of the scope, an online crime reporting application will be

implemented.

1.6 PURPOSE OF THE PROJECT


The aim of this project is to develop an online crime report and

managing system which is easily accessible to the public. The police

department and the administrative department.

This system registers the complaints from people through online and it

will also helpful to police department in catching criminals, in system and

person can give any complaint at any tie.

1.7 PROBLEM IN EXISTING SYSTEM

In general people in Nigeria are afraid to give a complaint in police

station because they are filled with a false fear about the police department.

An online complaint registration system will solve the fear of the public and

which also helps police department catching criminals and taking

appropriate action

PROPOSED SYSTEM: -

An online solution is very useful as the solution is inherently

distributive. This distributive characteristic of the online solution helps in

getting the different police stations to share information and get in contact

with one another


A web application is to manage criminal details in a centralized

database and provide solution for public to give complaint through online

and get online service.

1.8 LIMITATION OF THE STUDY

This project was constrained by the following factors:

(a) Financial Constraints

Bearing in mind the economic state of the nation, it was found

difficult in making both ends meet, because of the exorbitant nature of things

nowadays in travelling for the collection of data needed for the project.

(b) Time Constraints

Looking at the interval between the resumption and vacation of the

final semester for the project to be completed, the time given seemed to be

short for the collection of required information for better work to be done.

(c) Non-Availability of Material

During this project, it was noticed that the required materials needed

for the project are not documented. Those that were documented lacked

storage facilities where they can be reached.

1.7 DEFINITION OF TERMS


SYSTEM SECURITY refers to the technical innovations and procedures

applied to the hardware and operation systems to protect against deliberate

or accidental damage from a defined threat.

DATA SECURITY is the protection of data from loss, disclosure,

modification and destruction.

SYSTEM INTEGRITY refers to the power functioning of hardware and

programs, appropriate physical security and safety against external threats

such as eavesdropping and wiretapping.

PRIVACY defines the rights of the user or organizations to determine what

information they are willing to share with or accept from others and how the

organization can be protected against unwelcome, unfair or excessive

dissemination of information about it.

CONFIDENTIALITY is a special status given to sensitive information in a

database to minimize the possible invasion of privacy. It is an attribute of

information that characterizes its need for protection.

SOFTWARE: is a collection of data that tells the system how to perform a

particular task or operation. Or a sequential step by step process of carrying

out a task instruction.


SYSTEM: is a set of computer components (that is, the assembling of

hardware, software and peripherals to function together)

DATABASE: a database is a systematically arranged collection of computer

data so that it can automatically retrieved of manipulated. It is also called a

data bank.

APPLICATION: An application program (or application for short) is a

computer program designed to perform a group of coordinated functions,

tasks, or activities for the benefit of the user.


CHAPTER TWO

REVIEW OF RELATED LITERATURE

2.0 INTRODUCTION

In this chapter, a review of related literature was carried out the views

of various researchers on “DESIGN AND IMPLEMENTATION OF WEB

BASED CRIME REPORTING SYSTEM”. The review focused on the

following areas:

2.1 CRIME MANAGEMENT

The occurrence of crime is not random. It is spatially distributed in

patterns some patterns are discovered while others are not. Factor such as

social class, income level and environment play parts in the types of crime

that are committed. Resources and/or a lack of resources can influence the

probability of crimes committed in any given area, (Zender, 2003). Because

of the complexity of crime, crime has to be managed. Crime as various

definitions depending on which perspective one is looking at it from. For

this research crime is defined as “violation of law, or an instance of this,

punishable by the state,” (BCS Thought Leadership Debate, 26 October

2004). Management on the other hand is the process of directing and

controlling the resources of an organization such as its personnel, materials,


and equipment to achieve the goals of the organization. Crime management

is therefore defined as controlling, directing, and coordinating police

resources (money, equipment, and personnel) to prevent the violation of law

and where it has been violated, to apprehend the criminals and take them to

court.

2.2 BLUEPRINT FOR CITIZEN PATROLS

Citizen patrols are volunteers who survey an area to report incidents

and problems to the police and provide a visible presence that deters

criminal activity. Some use bicycles, motorcycles, vans or cars to cover

large areas. They generally have no policing powers, carry no weapons, are

non-confrontational, and always coordinate with law enforcement. Citizen

patrols can cover a village, a neighborhood, an apartment complex, a

business district, or a park. They contact the police dispatcher or crime desk

through two-way radios or cellular phones donated by a local business.

Cameras or video equipment may be used to record suspicious activity.

Many are based in a Neighborhood Watch group. The citizen patrol should:

• Undergo training by law enforcements

• Work in teams

• wear identifying clothing or ID


• Never carry weapons such as guns or knives

• Always carry a pad and pencil, and a flash light if it is dark

• Be courteous and helpful to residents of the area being patrolled

• Keep logs and file reports

Citizen patrols can take on extra duties, such as escort services, traffic

control, and crowd control at community events, identifying neighborhood

nuisance concerns, checking on homebound residents, and identifying and

reporting abandoned vehicles.

2.3 CRIME EDUCATION

According to (Allen, 2002) in a crime summit, he lays much emphasis

was on Crime Education. To start or strengthen a crime reporting system,

you need:

• Committed people

• A system for both anonymous and face-to-face reporting

• Education for those who run the system, handle reports and respond

helpfully to victims
• Education for the school or neighborhood on what to report, how to

report, and why to report

Education for those who run the system includes teaching those who

might receive crime reports in how to take a useful report, how to treat

reports confidentially, how to help victims, and how to teach others to use

the system. Operational details of the system, such as how often reports are

collected, what information is vital for a report to be useful, and what

happens to a report once it's received are important for this group.

Education for those who use the system on what should be reported -

specific kinds of crimes or crimes-in-the-making, tips about who committed

particular crimes, and so on; information that the report should contain; how

to report crime when time is critical, what will happen to reports, and how

reporting helps prevent crime and build a sense of security.

Education can happen in many ways - fliers and brochures advertising the

system, presentations at assemblies or in classes or meetings, videos that can

be shown at meetings or in classes, posters throughout the area, bookmarks,

and articles in the local paper are few examples.


2.4 CRIME REPORTING

The previous findings are enough to convince readers of the relevance

that reporting behaviour has for the criminal justice system and the

community. Citizens, through the reporting of their crime experiences, start

the criminal justice machinery which in turn enables investigation of crimes

by police, the prosecution and trial of offenders, and their punishment. The

deterrent effect of criminal justice is potentiated as well. On the other hand,

non-reporting precludes access to compensation schemes, offenders not

being arrested, and the goal of a more equitable criminal justice system

being achieved, (Harlow, 1985).

However, not all the victimization incidents are crimes in a technical

sense, and of those which are, some are very minor indeed. The police will

complete criminal offence reports in only a small number of these incidents.

Increased willingness to report what people perceive as crimes would result

in increased police efforts in dealing with minor incidents, not all of which

may result in satisfactory outcomes to the victims; an issue with potentially

negative consequences for the reporting of perhaps more serious future

incidents. Crime victimisation is an expression of social conflict, (Boba,

2005).
Reporting of perceived victimization experiences to the police

depends upon a complex set of factors ranging from seriousness of incidents

to confidence in the criminal justice system. A more complete understanding

of non-reporting, its distribution and its correlates will help us assess the

performance of our criminal justice agencies, (Skogan, 1984).

Reporting Methods

Effective methods of anonymous reporting include (Harlow,1985).

• The tip box

• The telephone coupled with an answering machine or voice mail

• E-mail to a central address

• A web site that directs reports to a central address

• Oral reports

The tip box usually consists of several locked boxes at key points around

the school or neighborhood. Each box has a slot for inserting written reports.

Boxes need to be located in places that are reasonably populated - not

deserted and not in the middle of heavy traffic. The box (and education

about using it) should remind students and citizens of what's needed for a

good report - a dated, legible note describing as much as possible what


happened where, when, how and by whom. Advantages of the tip box

include low cost, low reliance of technology, and written records.

Disadvantages include unreadable reports and limited access. Tip boxes also

require that someone physically visit and collect reports from each of the

boxes.

Telephone reporting systems offer a number of variations. Some include a

toll-free line directed to a cell phone. Some reporting lines are partnered

with a hotline. Calls left on a voicemail or answering machine can be

retrieved from anywhere. The report taker doesn't have to visit boxes. The

telephone approach allows students to call from school, from home, from a

friend's or from a pay phone. People tend to be comfortable talking on the

phone, so this approach leaves no lasting record of the report, unless

messages taped or transcribed and checked for accuracy. It also requires

resources - funds or in-kind donations for the equipment, the telephone

service, and a secure area in which to house the equipment.

E-mail and web sites have proved successful in reaching out to those who

are electronically literate. Some systems have both an e-mail box and a web

site for crime reports. Both e-mail and web approaches can provide printed
reports to send to appropriate authorities. There are drawbacks - setting up

the web page or e-mail properly (though a youth can probably provide help).

The fact that many Nigerians still may not have convenient access to

computers and the need to ensure security of the system to protect reporters'

anonymity is required at all cost.

Written and oral reports have the advantage that many people trust the

human link more than the plastic box or the electronics of phones and e-

mails

Education about crime reporting is an ongoing process. New participants

come in every year; the system acquires new features; or reporting methods

change. Education should target adults in the community as well as young

people. It should emphasize the preventive power of reporting, not just the

need to report crimes that happened or information on criminal suspects.

2.4 NEW TECHNOLOGY OF CRIME PREVENTION

Crime prevention is a concept that has been applied in a number of

ways to the problem of crime: it has been used to refer to both activities (e.g.

crime prevention programs and/or strategies) and outcomes (e.g. lower levels

of crime in communities and/ or lower levels of offending/re-offending by


individuals). In the name of crime prevention, researchers have examined

the influence/role of formal social control mechanisms (e.g. the deterrent

effects of police, courts, and corrections) and informal social control

mechanisms, with a focus on the influence (through mechanisms such as

attachment, commitment, and involvement) of family, peers, school, work,

community and the role of shame and belief systems/religion). In addition,

crime prevention strategies have been targeted on different levels of

prevention (primary, secondary, tertiary) and on the need for individual (i.e.

private actions), parochial (group actions by neighborhood residents), and

public actions (i.e. decisions to call the police) to prevent crime.

Understanding crime prevention requires studying intentions, as well as

consequences.

A broad array of measures needs consideration beyond the traditional

number of criminal events or offenders. Additional factors include the

amount of harm prevented or the number of victims harmed or harmed

repeatedly, (Bueerman, at al, 2005). An even broader definition of crime

prevention can be seen in the concern with newer factors such as reduction

of risk factors for crime (e.g., gang membership or failure to complete high

school). While crime prevention currently is used as a ubiquitous, catch-all


phrase that can be applied to both criminal justice-based and non-criminal

justice-based initiatives, our focus is on strategies that utilize new

technological innovations to either prevent crime (in particular places) or

prevent re-offending by targeted groups of offenders (e.g. sex offenders,

mentally ill offenders,) that do not rely exclusively on traditional actions by

the police (arrest), courts (prosecution), and/or corrections(punishment,

control, reform).

2.5 NEW TECHNOLOGY OF POLICING

Changes in both the hard and soft technology of policing appear to be

transforming local, state, and federal policing departments in a number of

fundamental ways; but some scholars have raised questions about how much

has really changed, (Robert, 2012). Two recent reviews, ((Bueerman, at al,

2005). of technology and the police describe this transformation process,

review the evidence of its impact on police practices and outcomes, and

discuss the implications of technological changes in policing for the public.

The following conclusions were arrived at: police technology has not been

found to significantly improve police performance (Bueerman, at al, 2005).

Similar assessments of the limited measurable impact of police

technology on police performance have been reached by others who have


reviewed the available research on the impact of recent technological

innovations on police performance (Robert, 2012).


CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

3.1 ANALYSIS OF THE EXISTING SYSTEM

The existing system in which a victim has to visit the nearest police

station makes crime reporting a very strenuous action as a result of

difficulties involved before information on a particular crime is lodged. Most

victims prefer to report directly to court as to maintain law and order in a bid

to seek justice. The police approach as regards FIR (FIRST

INVESTIGATION REPORT) encumbers rigid investigation and analysis of

crime thereby render innocent sometime culprit.

The same difficulties are faced by volunteers who wish to report

crime occurrence within their vicinities. This is a quite critical process by

which the victim has to undergo before lodging his/her FIR (FIRST

INVESTIGATION REPORT). At times, the criminal parties gave the bribe

to the police officers for not to lodge the FIR. As a result, the victim was not

being able to lodge his/her FIR and he/she has to visit the court. It is also

possible that when the victim is going to police station the criminal party

attacks on him/her. In this case, the victim was not be able to visit the police

station and may be killed by the criminal party.


The existing system is fully manual i.e. a lot of paper work has to be

done by the authorities as well as by the victim. With the current trend in

Information Technology, most of our daily activities are encapsulated by the

standardization and advent of innovation, therefore the era of constituting

police services and operation in a confused systemic approach needs to end

and a total embracement of Information Technologies should be a concern.

On the other hand, maintaining the paper based records and duplicating them

when required is another tedious process. For instance if a police officer is

asked for a separate file of any criminal record/file it may take few hours or

days to locate it depending on the size of the record. If the same case arises

with the computerized system, it will take only few seconds for duplicating

the records/files. We can also print the hardcopy of these records.

Also, protecting the files of important records from the reach of

criminal parties/ pesticides/ rodents etc. is another cumbersome task. Huge

amount of monies are expended for the physical safety of the important

files/records. Thus there are various challenges for manually maintaining the

records instead of the modern computer systems. As earlier discussed, the

existing problem is associated with potential problems as a result of epileptic

operation with the use of manual approach.


3.1.1 PROBLEM OF THE EXISTING SYSTEM

The followings are the problems gathered from existing system

• Accuracy – The present system cannot be ascertained as containing

accurate information as regards any information on a crime gathered by the

police. The system is corrupt and porous to accommodate any manipulation

by corrupt officer(s) in charge. Due to bulkiness files, cases might be thrown

aboard and new ones formulated which will suit their (corrupt officers)

whims and caprices.

• Waste of Time – It leads to waste of time as there is much paper

work involved which requires flipping through loads/stocks of file before

information is fetched.

• Lack of integrity

• Efficiency

3.2 SYSTEM CAPABILITIES

The portal has the following few sections, which are discussed below:

Administrator

• An Administrator page is provided through which handles the site,

databases and allow detectives, citizens and Defense Officials access to the

site. A FIR (FIRST INVESTIGATION REPORT) form is provided


through which citizens can enter details of the crime reported. This data once

entered can be edited/deleted as required.

• There are sections provided for Defense Officials, Detectives and

citizens.

Citizens

In Citizens sections, user can enter the details of FIR (FIRST

INVESTIGATION REPORT) through the help of portal. The portal has

forms that will ask for the details of victim(s), crime id /name /location/

address /city /country /contact person /contact number /contact, Email-Id.

After entering the details the data will be saved by clicking save button and

the details will be stored in the FIR database. Each FIR will be given a

unique ID.

Administrator(s)

In Administrator section, various data is available for searching details

of criminals, FIRs, judicial results, case hearings and other. Administrator

can update databases for the required fields.

• Proofing - Crime Reporting forms, progress tracking, and proof

attachments.
• Search- In Search section, authorized detectives and Defense

Officials will search for matching records of criminals, FIR details, missing

people etc.

• Alert Services- An alert can be sent to the citizen regarding the FIR

ID and an alert can be sent to a concerned person of the area regarding the

CRIME

3.3 SYSTEM FUNCTIONALITIES

Crime reporting forms, progress tracking, proof attachments.

• On form submission an e mail goes to regional police officer in case if

it’s serious category crime where quick attention is required.

• Facilitate crime and criminals search – region, crime-type, gender, age

group wise etc.

• Missing citizen or valuables reporting and search

• Secure registration and profile management facilities for detectives

and security agencies

• Facilitate communication between all stakeholders – Discussion

forum/chat/mail/polls

• Help book & time-to-time instructions to users through mail


3.4 REQUIREMENTS SPECIFICATION

This proposed software runs effectively on a computer system which

has the minimum requirements. The requirements are split into two

categories, namely:

3.4.1 Software Requirements

The minimum software requirements to run the program are listed

below

i. Microsoft Windows XP (Home and Professional Editions), Windows

ii. MySQL

iii. JavaScript, PHP/HTML, CSS, jQuery

iv. Browser e.g. Mozilla Firefox, Safari, chrome, Flock e.t.c.

v. Local Server e.g. WAMP Server, XXAMP or EasyPHP Server

3.4.2 Hardware Requirements

The minimum hardware required to run the program are listed below

i. Hard disk of 20 Giga bytes

ii. System memory (RAM) of 512 Mega bytes

iii. Dot Matrix, Laser jet Printer

iv. Compatible flash drive or external Hard disk


CHAPTER FOUR

SOFTWARE DEVELOPMENT METHODOLOGY

4.1 ARCHITECTURE OF THE PROPOSED SYSTEM

The proposed system is aimed at providing a flexible platform that

enhances user friendliness.

Figure1: Context Diagram

4.2 DESCRIPTION OF ARCHITECTURAL DESIGN

In this context diagram, the information provided to and received

from the ‘Online Crime Reporting System’ is identified. The arrows

represent the information received or generated by the application. The

closed boxes represent the set of sources and sinks of information. In the
system, we can observe that the user interacts with the application through a

graphical user interface (GUI). The inputs to the system are the FIRs,

profile, police detail etc. criteria provided by the user and a new review

written by the user to some certain entries unlike FIRs. Also, the output is in

the form of repeater and grid views which present the users (Police) with the

list of FIR available. The users (police) can view complete FIRs or

complaints; view Images and reviews by other users (public).

4.3 OBJECT-ORIENTED SYSTEM ANALYSIS AND DESIGN

SYSTEM DESCRIPTION

• Victim/Volunteer reports officially or lodges FIR

• FIR ID number is generated to assist easy referencing rather than a

muddle up

• Victim/Volunteer performs a follow-up as a confirmation if the report

is being taken care

• Police examines the report for further analysis and identification

• Police marks a particular area as notorious (this is not system

requirement).

4.4 IDENTIFYING THE ACTORS


The actors in the system are the victim/volunteer, the police and the

reporting system consisting of form processing, record documentation,

Analysis and report generation. The victim/volunteer is a passive user–actor

who initiates the process and lodges FIR, a goal of measurable value. The

police are an active user–actor, who triggers the system and has the role of

performing investigation with the responsibility of collecting the correct

information from the victim/volunteer, which is a measurable value.

Predesigned and deployed crime reporting system at the back end is a

system actor–user to ensure that crime report/investigation processing is

done correctly and different system statuses are updated on handling the

FIR. This actor has an active role and responsibility at the back end.

4.5 PROCESS MODEL –CRIME REPORTING SYSTEM

Based on the system observation by the analyst, a high-level activity

diagram is drawn modeling the process of crime report lodged by the

victim/volunteer.

The activity diagram brings everybody concerned with the system on

the ground to a common understanding of the system as it functions.


Figure 2: The Activity Diagram of Crime Reporting System
4.6 USE CASES

In the Crime Reporting systems, users are the victims/volunteer, the

Police and Crime Reporting System (CRS). Take each user and identify the

roles played, which would lead us to identify the roles played, an

identification of use case. Table 3.1 shows the result of the process of

identifying the use cases.

The system has three users, eight roles and eleven use cases. To

illustrate the process of identifying the use cases, let us take the

victim/volunteer (a user of the system). A victim/volunteer as a user may

play one or more of three roles. The roles are

1. Lodging FIR/Complaints about a crime.

2. Assist the police with adequate and necessary information required for

swift investigation

3. Follow-up to ascertain that the report is treated or considered by the

police

As explained in the case of victim/volunteer, the roles are use cases.

Similarly, one can probe into the roles and use cases for police and crime

reporting system.
Table 1: Roles in use case
Users Roles Use Case

Victim/volunteer Lodging Crime Reporting


FIR/Complaint Process
Provide necessary
Information
Follow-up

Police Perform validation


and verification of
the information
Data Manager

Report Generation
Crime Reporting Server System Structures the
System report, process
FIR and prepare
documentation
Updates the
record, enforce
data integrity and
back-up

4.7 INTERACTION DIAGRAMS

Interaction diagrams are used to show the interactions between

user/actor and the system. Use case is a scenario that develops through

interaction. Let us model different scenarios through interaction diagrams:

Use Case: Crime reporting process

1. Victim/volunteer fills form to lodge FIR

2. Police checks for validity and verifies the information source.

3. If OK, the police proceed with the investigation.

4. If not OK, the police ignore and file the report as counterfeit.

5. Document for an immediate action.

6. Steps 2 to 4 are repeated.


Figure 3 shows the steps in the activity diagrams of use case crime reporting

process

Victim

Visit the
application

Fills the FIR


form to Lodge

Process the FIR and


send alert to the
victim/volunteer and

Police

Police fetches the


information for analysis and
investigation

Counterfeit

Document for
Immediate action

Fig 3: Use case Diagram of Crime Reporting Process

Use case: Police

The steps involved in this use case are:

1. Police logins to the platform

2. Performs analysis on FIR lodged by a victim or volunteer.


3. Document the FIR for an immediate action
Police

Login the application

Not Ok

Exist

Ok

Fetch information

Perform analysis
and verification

Figure 4: Access Use Case

4.8 ANALYSIS OF MODULES

• Password Module: In this module, user enters a password and the

portal checks its validity. If the password is valid then he is allowed to enter,

otherwise “Invalid User/Password” message is displayed. This is done to

avoid unauthorized access.

• Search: In the Search section, authorized detectives and Defense

Officials will search for matching records of criminals, FIR details, missing

people etc.
• Contact of Concerned Authority: Contact details of the area official

who is solving the case.

• Progress: Case study and progress of the case entered by the FIR can

be found in this section. All the progress reports and special remarks can be

entered in the database by Administrator(s).

• Queries: Detailed information of the crime can be entered and

retrieved by administrator(s) only because of the security point of view.

• Registration: Secure registration and profile management facilities

are available for detectives and security agencies.

• Validation of Data entered by the user and error handling: In this

module, the validity of data entered by the user during the various processes

is checked through various validation checks. For example, there shouldn’t

be any characters entered in the numeric fields. Likewise if there is any error

it should handle that particular error and give the appropriate messages.
CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATIONS

5.1 SUMMARY

The world is experiencing an information knowledge revolution that

is fundamentally transforming the way in which human activities are carried

out. Governments worldwide are adopting e – government as a means of

improving their services to businesses and citizens, promoting economic and

social development, and enhancing the effectiveness and efficiency of

government operations. In current competitive scenario every

business/public establishment needs quality and systematic process to

increase their working efficiency as well as improve their productivity. It is

keeping in mind this business philosophy that we propose.

5.2 CONCLUSION

In conclusion, we have, in this study, looked at the various definitions

of criminal statistics. Finally, a prototype crime reporting system was

designed that relies on four reporting forms: a complaint or dispatch

reporting form, a crime event report form, follow-up investigation report

form, and an arrest report form. The system consists of three functional

modules: a data capture module, a report management and control module,


and a data utilization module. The system maintains an event or case file and

a police activity file. The conceptual crime reporting system design and data

elements thus developed must now be tested and evaluated in an operational

environment.

5.3 RECOMMENDATION

After the design and implementation of the system the researcher

recommend the following:

i. The public should assist the police with adequate and necessary

information required for swift investigation

ii. Follow-up should be ascertain so that the report is treated or

considered by the police.

iii. An effective antivirus should be installed in the system so that the

system may not be affected by virus.

iv. The system should not be put to use where there is no power supply.

v. This application should be implemented where there is internet

service.
REFERENCES

Allen, O. (2002). “Meaning of Crimes”, Crime Management

BCS Thought Leadership Debate, 26 October 2004

Black, D. (1984). “Crime as social control”, in Toward a General Theory of


Social Control, vol. 2, Selected Problems, ed.

Boba, R. (2005). Crime Analysis and Crime Mapping

Chavez, P. & Bueerman, L. (2005), “The use of Knowledge Management


framework in addressing crime prevention and security”

Harlow, W. (1985). Reporting Crimes to the Police: Bureau of Justice


Statistics Special Report NCJ-99432, US Government Printing Office,
Washington DC.

Lyon, D. (2005). “Global Positioning System” Location Tracker

Robert, D. (2012). Crutchfield, George S. Bridges, and Susan R. Pitchford,


“Analytical and Aggregation Biases in Analyses of Imprisonment:
Reconciling Discrepancies in Studies of Racial Disparity,” Journal of
Research in Crime.

Sellin, T. (2011). "The Significance of Records of Crimes" The Law


Quarterly Review, P. 489.

Skogan, L. (1984). “Reporting crimes to the police: The status of world


research”, Journal of Research in Crime and Delinquency, vol. 21, pp.
113-37.

The Nigeria Dailies, (2009). “The Historical Background of Nigerian


Police”.

Zender, G. (2003). 'Too Much Security?', International Journal of the


Sociology of Law, 31 (3): 155-184.

You might also like