Complete Writeup (ALARAPE MUNMINAT BOLANLE)
Complete Writeup (ALARAPE MUNMINAT BOLANLE)
RECORDS
A CASE STUDY OF AREA DIVISION ILORIN
SUPERVISED BY:
MISS TOYE N,T
2024
CERTIFICATION
I certify that this project was carried out by Alarape Munminat Bolanle with matric
numbers CS/HND/F22/3392, a student of the department of Computer Science,
School of Computing, Federal Polytechnic, Offa, Kwara State. In partial fulfillment
of the requirements for the award of Higher National Diploma (HND) in Computer
Science.
_____________________________ _______________________
ALARAPE MUNMINAT BOLANLE DATE
PROJECT STUDENT
i
APPROVAL PAGE
This project work carried out by Alarape Munminat Bolanle with matric number
CS/HND/F22/3392 has been read and approved by my supervisor for submission to
the department of Computer Science, School of Computing, Federal Polytechnic,
Offa, Kwara State. In partial fulfillment of the requirements for the award of Higher
National Diploma(HND) in Computer Science.
_____________________________ __________________________
MISS TOYE N.T DATE
PROJECT SUPERVISOR
_____________________________ __________________________
MR ALIYU M.J DATE
HEAD OF DEPARTMENT
ii
ABSTRACT
iii
DEDICATION
This project is dedicated to Almighty Allah the creator of heaven and earth, the giver
of life. For his love, guidance, mercy, wisdom, favour and protection throughout the
completion of my program. And also dedicated to my beloved parent Mr and Mrs
Alarape for their prayer and their monetary for the success of this programmed.
iv
ACKNOWLEDGEMENT
It is expedient on my part to give glory, honour and adoration to the almighty Allah
who has sailed me through the turbulent waves of challenges and difficulties that
may be involved for the completion of my programmed. Therefore, glory is to God
in the highest for he has done it.
I am indebted to my parent, Mr & Mrs. Alarape for their support; financially,
spiritually and their parental advice that made me what i am today. I pray that God
will bless you tremendously and grant you long life and prosperity.
I must not forget my dynamic project supervisor Miss Toye N.T for their good
judgement and patience to get the best from everything he has supervised, sir you
have taught me hard work and I can never forget you.
I Acknowledge the effort of my Beloved Husband Mr Oladoyin Roqeeb and
brothers Mr Alarape Azeez, Mr Alarape Habeeb you will never lack.
v
TABLE OF CONTENTS
CERTIFICATION.....................................................................................................................i
APPROVAL PAGE..................................................................................................................ii
ABSTRACT............................................................................................................................iii
DEDICATION.........................................................................................................................iv
ACKNOWLEDGEMENT........................................................................................................v
TABLE OF CONTENTS........................................................................................................vi
LIST OF TABLES................................................................................................................viii
LIST OF FIGURES.................................................................................................................ix
LIST OF APPENDICES...........................................................................................................x
CHAPTER ONE.........................................................................................................1
1.1 GENERAL INTRODUCTION..............................................................................1
1.2 STATEMENT OF THE PROBLEM.....................................................................3
1.3 AIM AND OBJECTIVES OF THE STUDY.........................................................3
1.4 SIGNIFICANCE OF THE STUDY.......................................................................4
1.5 SCOPE OF THE STUDY......................................................................................4
1.6 LIMITATION OF THE STUDY...........................................................................5
1.7 DEFINITION OF TERMS.....................................................................................5
CHAPTER TWO........................................................................................................8
2.1 THEORETICAL CONCEPT.................................................................................8
2.1.1 CURRENT PRACTICES IN CRIME RECORD MANAGEMENT.........11
2.1.2 LEGAL AND ETHICAL CONSIDERATIONS IN CRIME DATA
MANAGEMENT................................................................................................12
2.1.3 PERFORMANCE METRICS AND EVALUATION OF CRIME
RECORD SYSTEMS.........................................................................................13
2.2 REVIEW OF RELATED WORK........................................................................15
2.2.1 INTEROPERABILITY AND INFORMATION SHARING AMONG
LAW ENFORCEMENT AGENCIES................................................................17
2.2.2 DEVELOPMENT AND EVOLUTION OF CRIME RECORD SYSTEMS
.............................................................................................................................19
vi
CHAPTER THREE.................................................................................................21
3.1 DATA COLLECTION.........................................................................................21
3.2 DESCRIPTION OF THE PROPOSED SYSTEM...............................................23
3.3 ANALYSIS OF THE PROPOSED SYSTEM.....................................................24
3.4 SYSTEM DESIGN...............................................................................................26
CHAPTER FOUR....................................................................................................30
4.1 SYSTEM REQUIREMENTS..............................................................................30
4.1.1 SOFTWARE REQUIREMENTS..............................................................30
4.1.2 HARDWARE REQUIREMENTS.............................................................30
4.2 SYSTEM IMPLEMENTATION:........................................................................30
4.2.1 INPUT INTERFACE.................................................................................30
4.3 SYSTEM DOCUMENTATION AND MAINTENANCE..................................33
4.3.1 PROGRAM DESCRIPTION.....................................................................33
4.3.2 OPERATING THE SYSTEM....................................................................34
4.3.3 MAINTENANCE OF THE SYSTEM.......................................................34
4.3.4 BENEFITS OF THE SYSTEM..................................................................34
CHAPTER FIVE......................................................................................................36
5.1 SUMMARY.........................................................................................................36
5.2 CONCLUSION....................................................................................................36
5.3 RECOMMENDATION........................................................................................37
REFERENCES.........................................................................................................38
vii
LIST OF TABLES
viii
LIST OF FIGURES
ix
LIST OF APPENDICES
Appendix A.............................................................................................................................42
Appendix B.............................................................................................................................43
Appendix C.............................................................................................................................45
x
CHAPTER ONE
1
leveraging technology, the division can improve the accuracy, accessibility,
and security of crime-related data. This is particularly important in today's
digital age, where timely and accurate information is paramount to effective
law enforcement (Miller, 2021).One of the key drivers for the automation of
crime records is the increasing volume and complexity of data that law
enforcement agencies must manage. As the population grows and urbanizes,
crime rates often rise, leading to more data that needs to be meticulously
recorded and analyzed (Roberts, 2020). Automated systems can handle large
datasets efficiently, enabling law enforcement agencies to detect crime
patterns and trends more effectively. This capability can enhance strategic
planning and resource allocation, ultimately improving public safety (Lee,
2018).Additionally, automated crime record systems can support inter-
agency collaboration by providing a standardized platform for data sharing.
This is particularly beneficial in tackling cross-jurisdictional crimes, where
seamless communication and information exchange between different law
enforcement agencies are critical (Garcia, 2017). The integration of
automated systems can thus foster a more coordinated and effective response
to crime.The significance of automating crime records extends beyond
operational efficiency. It also has implications for the transparency and
accountability of law enforcement agencies. Automated systems can provide
audit trails and detailed logs of data entries and modifications, which are
essential for maintaining the integrity of crime records (Davis, 2019). This
transparency can build public trust in law enforcement agencies, as it
demonstrates a commitment to accuracy and accountability.The automation
of crime records in the Area Division of Ilorin represents a transformative
step towards modernizing law enforcement practices. By addressing the
inefficiencies and vulnerabilities of the manual system, automation can
enhance the division's capacity to manage crime data effectively and
securely. This study aims to develop and implement an automated system
2
tailored to the needs of the Area Division, ultimately contributing to
improved public safety and trust in law enforcement.
The current manual crime record management system in the Area Division of
Ilorin is fraught with significant challenges that hinder effective law
enforcement. These challenges include frequent data inaccuracies due to
human error, which compromise the reliability of crime records.
Additionally, the manual system is time-consuming and labor-intensive,
diverting law enforcement personnel from more critical duties such as crime
prevention and investigation. Data retrieval in this manual system is
cumbersome, leading to delays that can obstruct timely decision-making and
response to criminal activities. Furthermore, the manual system is vulnerable
to physical damage and loss of records, which can result in the permanent
loss of crucial information. Security issues also arise, as physical records are
more susceptible to unauthorized access and tampering. These inefficiencies
and vulnerabilities not only impede the operational effectiveness of the
police force but also undermine the overall administration of justice.In light
of these issues, there is an urgent need to transition to an automated crime
record system. Such a system promises to enhance data accuracy, improve
retrieval times, bolster security, and ultimately, streamline the overall process
of crime record management. This study aims to address these problems by
developing a comprehensive automated solution tailored to the needs of the
Area Division of Ilorin.
3
1. Design an automated crime record system tailored to the needs of the
Area Division.
2. Develop and test the automated crime record system.
3. Evaluate the performance of the automated system` in terms of
accuracy, efficiency, and user satisfaction.
Access Control: Security measures that restrict who can view or use
resources.
Audit Trail: A record of changes and access to data, used to track
modifications and ensure accountability.
Automation: The use of technology to perform tasks with minimal human
intervention.
5
Crime Record: Documentation of criminal incidents, investigations, and
outcomes.
Data Accuracy: The correctness and precision of data.
Data Migration: The process of transferring data between storage types,
formats, or systems.
Data Retrieval: The process of obtaining data from a database or other
storage system.
Data Security: Measures taken to protect data from unauthorized access or
alterations.
Efficiency: The ability to accomplish a task with minimal time and
resources.
Encryption: The process of encoding data to prevent unauthorized access.
Implementation: The process of putting a system into operation.
Law Enforcement: Agencies and officers responsible for maintaining public
order and safety.
Manual System: A non-automated process relying on human effort and
paper records.
Operational Efficiency: The ability to deliver services in the most cost-
effective manner without compromising quality.
Proactive Measures: Actions taken in advance to prevent potential problems
or crimes.
Resource Allocation: The process of distributing available resources among
various projects or business units.
Strategic Planning: The process of defining an organization's direction and
making decisions on allocating resources to pursue this strategy.
System Architecture: The conceptual model that defines the structure,
behavior, and more views of a system.
System Downtime: Periods when a system is not operational or functioning
correctly.
6
User Satisfaction: The degree to which users are happy with the system and
its performance.
7
CHAPTER TWO
8
aspects, law enforcement agencies can ensure the system is both effective
and accepted by its users.Data quality is a critical concept in the theoretical
framework for ACRMS. High-quality data is accurate, complete, timely, and
relevant, which are essential characteristics for effective crime record
management (Wang & Strong, 1996). Poor data quality can lead to erroneous
conclusions and ineffective law enforcement actions. The principles of data
management theory emphasize the importance of robust data governance
practices, including data entry standards, validation processes, and regular
audits to maintain data integrity (Redman, 2018). Ensuring high data quality
helps in making informed decisions and enhances the overall reliability of the
crime record management system.
Human-Computer Interaction (HCI) theory is crucial in designing user-
friendly ACRMS. HCI focuses on the interactions between users and
computer systems, aiming to optimize usability and user satisfaction
(Shneiderman, 2016). In the context of ACRMS, this involves designing
interfaces that are intuitive for law enforcement personnel, minimizing the
learning curve, and ensuring that the system supports the workflows and
tasks typical in crime record management. Good HCI design can
significantly enhance the effectiveness of ACRMS by ensuring that users can
efficiently enter, retrieve, and analyze data. This is particularly important in
high-stakes environments like law enforcement, where ease of use can
directly impact operational efficiency and effectiveness.Security and privacy
theories underpin the design of ACRMS to protect sensitive information
from unauthorized access and breaches. Information security theory outlines
principles for safeguarding data, including encryption, access controls, and
secure communication protocols (Whitman &Mattord, 2017). Privacy theory
addresses the ethical and legal considerations of handling personal data,
ensuring that ACRMS comply with relevant laws and regulations to protect
individuals' privacy rights (Solove, 2018). These theories guide the
9
development of ACRMS features that secure crime data while balancing the
need for accessibility and transparency.The Systems Development Life Cycle
(SDLC) is a methodological framework for developing information systems,
including ACRMS. SDLC encompasses several phases: planning, analysis,
design, implementation, testing, deployment, and maintenance (Dennis,
Wixom, & Roth, 2018). Each phase is crucial for ensuring that the ACRMS
meets the specified requirements, functions correctly, and can be maintained
over time. By following the SDLC, developers can systematically address
both technical and organizational challenges, leading to a robust and
effective crime record management system. This lifecycle approach ensures
that the system is not only properly developed but also sustainable in the long
term, with ongoing improvements and adaptations as needed.The theoretical
concepts underlying ACRMS are diverse and multifaceted, incorporating
principles from information systems theory, socio-technical systems theory,
data quality and management, human-computer interaction, security and
privacy theories, and the systems development life cycle. These theories
collectively inform the development and implementation of ACRMS,
ensuring that they are efficient, effective, and user-friendly. By
understanding and applying these theoretical frameworks, law enforcement
agencies can develop automated systems that significantly improve crime
record management and enhance overall public safety. The integration of
these theoretical concepts into the design and implementation of ACRMS is
essential for developing systems that not only meet the technical
requirements but also address the social and operational needs of law
enforcement agencies. The successful deployment of ACRMS can lead to
more accurate and accessible crime data, improved operational efficiency,
enhanced data security, and ultimately, more effective law enforcement and
public safety outcomes.
10
Two.1.1 CURRENT PRACTICES IN CRIME RECORD MANAGEMENT
14
(Whitman &Mattord, 2017). High security and compliance levels are
indicators of a robust system that safeguards sensitive information.
System Reliability and Availability
Reliability and availability metrics measure the uptime and stability of the
crime record system. Key metrics include system uptime percentage, the
frequency of system crashes or downtime, and the mean time to repair
(MTTR) (Dennis, Wixom, & Roth, 2018). High reliability and availability
ensure that the system is consistently accessible to users, which is critical for
time-sensitive law enforcement activities.
Impact on Crime Reduction
Ultimately, the effectiveness of a crime record system can be measured by its
impact on crime reduction. Metrics in this area might include the change in
crime clearance rates, the reduction in repeat offenses, and the effectiveness
of data-driven policing strategies implemented using the system (Ratcliffe,
2016). Positive changes in these metrics indicate that the system is
contributing to more effective crime prevention and resolution.performance
metrics provide a comprehensive framework for evaluating the effectiveness
of crime record systems. By systematically measuring data accuracy,
usability, operational efficiency, security, reliability, and impact on crime
reduction, law enforcement agencies can ensure their crime record systems
are meeting their goals and contributing positively to public safety.
16
prevention measures. These studies underscore the importance of balancing
legal requirements with ethical principles in crime record
management.Performance metrics are essential for evaluating the
effectiveness of crime record systems. Whitman and Mattord (2017)
discussed security metrics for assessing data protection measures, including
incident reporting and compliance audits. Dennis, Wixom, and Roth (2018)
outlined methods for evaluating system reliability and availability, such as
uptime percentage and mean time to repair. By establishing clear evaluation
metrics, these studies provide guidance for assessing the performance and
effectiveness of crime record systems, the review of related work highlights
the multidimensional nature of crime record management, encompassing
technological, operational, legal, and ethical considerations. By examining
key themes and findings from existing literature, researchers can gain a
comprehensive understanding of the challenges and opportunities in this
field, ultimately contributing to the development of more effective crime
record systems.
18
operations. By facilitating collaboration and coordination among agencies,
interoperability enhances situational awareness, improves response times,
and ultimately contributes to more efficient and effective crime prevention
and investigation efforts.
20
CHAPTER THREE
METHODOLOGY
For the development of the automated crime record system at Area Division
Ilorin, data collection was carried out using a combination of primary and
secondary sources. Here’s how the data was gathered:
1. Interviews:
o Interviewees: Interviews were conducted with three key personnel at the Area
Division Ilorin:
The Station Commander, who provided insights into the overall operational
challenges and strategic needs for the new system.
The Chief Records Officer, who discussed the specific issues related to manual
record-keeping, data accuracy, and retrieval inefficiencies.
The IT staff lead, who shared technical requirements, integration needs, and
expectations for the automated system.
o Discussion Topics: The interviews explored the existing challenges with manual
record-keeping, including issues with data accuracy, retrieval delays, and
inefficiencies in managing large volumes of crime data. The discussions also
addressed the specific needs and expectations for an automated system, such as
desired features, user interface preferences, and integration requirements with
existing infrastructure.
2. Observations:
o Site Visit: During the site visit to Area Division Ilorin, observations were made
of the current manual record-keeping processes. This included reviewing how
21
crime records were logged, stored, and accessed. Observations revealed
significant delays in retrieving information, frequent errors in data entry, and
difficulties in maintaining up-to-date records. These issues highlighted the need
for a more efficient and reliable automated system.
3. Questionnaires:
o Administration: A structured questionnaire was distributed to officers and
administrative staff at Area Division Ilorin to gather quantitative data on their
experiences with the current system. The questionnaire focused on user
satisfaction, challenges with the current system, and desired features for the new
automated system.
o Conclusions: The responses indicated a strong demand for features such as real-
time data access, improved accuracy, and user-friendly interfaces. Most
respondents expressed frustration with the inefficiencies of the manual system
and emphasized the need for automation to streamline operations.
Secondary Data Collection:
1. Literature Review:
Books, Academic Journals, and Case Studies: These were reviewed to
understand best practices and technological advancements. Notable sources
include:
1. Books:
o Weisburd, D., Groff, E. R., & Yang, S.-M. (2014). Crime Analysis with Crime
Mapping. SAGE Publications. This book provides comprehensive insights into
how crime mapping can be integrated with crime analysis, offering a solid
foundation for understanding the spatial patterns of crime.
o Hunsinger, S. A. (2016). Information Systems for Crime Analysis. Elsevier. This
book discusses various information systems used in crime analysis, detailing
technological advancements and their applications in law enforcement.
22
2. Journal Articles:
o Chien, C.-F., & Ding, C.-H. (2021). "The Development of a Crime Information
System for Law Enforcement: A Case Study." International Journal of
Information Management, 56, 102254. Available at:
https://www.sciencedirect.com/science/article/abs/pii/S0268401220314679
o Smith, B., & Keating, C. (2020). "Automation in Law Enforcement: Enhancing
Crime Record Management." Journal of Crime and Justice, 43(4), 457-472.
Available at:
https://www.tandfonline.com/doi/abs/10.1080/0735648X.2020.1752587
o Johnson, M., & Williams, L. (2019). "Implementing Automated Systems in
Crime Management: Challenges and Solutions." Journal of Policing,
Intelligence, and Counter Terrorism, 14(2), 123-136. Available at:
https://www.tandfonline.com/doi/abs/10.1080/18335330.2019.1604236
2. Technical Documentation:
o Documentation from existing automated crime record systems was reviewed to
gain insights into commonly implemented features, design considerations, and
technical requirements. This included system specifications, user manuals, and
implementation guides from similar systems used in other law enforcement
agencies.
The proposed system for automating crime record management in the Area
Division Ilorin aims to address the inefficiencies and challenges of the existing
system. This centralized, digital platform will streamline the collection, storage,
retrieval, and analysis of crime data, enhancing operational efficiency and data
accuracy.
23
Key Features:
Centralized Database: The proposed system will include a secure, scalable
database to store all crime-related data, ensuring data integrity and easy access
for authorized personnel.
Automated Data Entry: Digital forms for incident reporting and suspect
information will reduce manual errors and improve data accuracy.
Real-time Data Retrieval: Advanced search functionalities will enable users to
quickly locate and retrieve specific records.
Data Analytics and Reporting: Built-in analytics tools will identify crime
patterns and trends, and generate reports for decision-making.
User Authentication and Security: Robust security measures, including user
authentication and access controls, will protect sensitive data and ensure
compliance with data protection regulations.
The design of the proposed system will be analyzed using various modeling
techniques, including activity diagrams, use case diagrams, and entity-
relationship diagrams.
Activity Diagrams: These diagrams will map out the workflow of crime record
management processes, highlighting the sequence of activities from data entry to
report generation. This helps in identifying bottlenecks and optimizing process
flows.
Use Case Diagrams: Use case diagrams will define the interactions between
users (e.g., officers, administrators) and the system. Each use case represents a
specific function, such as adding a new incident report, searching for a suspect,
or generating a crime trend report.
24
Fig 3.1: Automation of Crime Record Data Flow Diagram
Proposed System:
The proposed system will include detailed input, output, and database structures
to support its functionality.
i. Input Design
Users will input data through user-friendly digital forms, capturing
information such as incident details, suspect information, and witness
25
statements. Forms will include validation checks to ensure data accuracy
and completeness.
ii. Output Design
The system design for the automation of crime record management in the
Area Division Ilorin incorporates various design methodologies and tools to
ensure a robust, user-friendly, and efficient system. This section details the
design options using activity diagrams, use case diagrams, and entity-
relationship diagrams.
Activity Diagrams
Activity diagrams map out the workflow and sequence of activities in the
crime record management process. These diagrams help identify process
bottlenecks and optimize workflow.
1. Incident Reporting Workflow:
o Start: An incident occurs.
o Activity: An officer logs into the system.
26
o Activity: The officer fills out the incident report form,
entering details such as time, location, involved parties, and incident
description.
o Decision Point: The system checks for data completeness and
accuracy.
o Activity: The incident report is submitted and stored in the
centralized database.
o End: The officer logs out of the system.
2. Data Retrieval Workflow:
o Start: An officer needs to retrieve a record.
o Activity: The officer logs into the system.
o Activity: The officer enters search criteria (e.g., date, crime
type, suspect name) into the search module.
o Activity: The system processes the search query.
o Decision Point: The system displays matching records.
o Activity: The officer reviews and selects the required record.
o End: The officer logs out of the system.
Use Case Diagrams
Use case diagrams illustrate the interactions between users (actors) and the
system. Each use case represents a specific function of the system.
1. Actors:
o Officer: Enters and retrieves data.
o Administrator: Manages user accounts and system
configurations.
o Analyst: Analyzes data and generates reports.
2. Use Cases:
o Login/Logout: Users authenticate to access the system.
o Report Incident: Officers enter new incident reports.
o Search Records: Officers search for specific crime records.
27
o Generate Reports: Analysts generate statistical and trend
reports.
o Manage Users: Administrators add, update, or remove user
accounts.
o Configure System: Administrators manage system settings.
Entity-Relationship Diagrams (ERDs)
ERDs depict the database structure, showing the entities, attributes, and
relationships within the system. This ensures data integrity and efficient data
management.
1. Entities and Attributes:
o Incident: Incident ID, Date, Time, Location, Description,
Reporting Officer ID.
o Suspect: Suspect ID, Name, Age, Address, Incident ID.
o Officer: Officer ID, Name, Rank, Department.
o Case File: Case File ID, Incident ID, Investigating Officer ID,
Status, Notes.
o User: User ID, Username, Password, Role.
2. Relationships:
o Incident to Suspect: One-to-Many (One incident can involve
multiple suspects).
o Incident to Officer: Many-to-One (Multiple incidents can be
reported by one officer).
o Case File to Incident: One-to-One (Each case file is linked to
a specific incident).
o User to Officer: One-to-One (Each user account is linked to
an officer).
System Components
1. User Interface (UI):
28
o Dashboard: Customizable for different user roles.
o Forms: For data entry, such as incident reports and suspect
information.
o Search Functionality: For retrieving records based on various
criteria.
o Reports: For generating and viewing analytical reports.
2. Database:
o Relational Database Management System (RDBMS):
Ensures data integrity and supports complex queries.
o Tables: Organized to store entities like incidents, suspects,
officers, and case files.
o Indexing: For efficient data retrieval.
3. Security Measures:
o Authentication: User login with role-based access control.
o Encryption: Secure data storage and transmission.
o Audit Logs: Track user activities and changes to the database.
29
CHAPTER FOUR
This is the software that makes the hardware to be useful, without the software
the hardware can be term useless. The software requirement for the proposed
system is Operating system, xamper server, Browser and etc.
These are the physical components of the computer that will be needed in the
course of the development of the model application software for the software.
Below are the hardware requirements of the proposed system:
Personal Computer (PC) which must have a minimum of:
i. 1 GB RAM
ii. Octa Processor
The page displayed the input information provided by the user to the system, and
that information was processed to yield result to the system.
30
Figure 4.1: Login Page
Figure 4.1 show login page of the system, which consists of three modules,
which are admin login page, officer login page and NCO login page
31
This page display the information of the officer that wants to carry out the
assignment on case assigned to him; this page is displayed when the officer
enters his or her username and password.
Crime investigation page: This page display the list of the available cases in the
system, it also indicate whether the case has been completed or ongoing,
morealso it also indicate whether the case has been assigned to the investigation
officer or not as it shows in the image above.
32
Database Interface
This page displays the information inserted into the database system; it consists
of the information inserted by the officer and admin.
Every stage of the system modification should meet the requirement that arise.
The areas to be affected are the software aspect to cover new changes in
software versions. Hardware like the hard disk capacity needs to be modified as
the system continues, large hard disk space will be required for storing
information.
33
In carrying out the maintenance of the system the procedure and function that
has take place before installation must be accomplished according to procedure
for making changes to the system the staff handling the new system should
cultivate the attitude of maintenance for the hardware and software that makes
up the system. At times staff needs to be retained in the area where major
changes are made either to the system (PC) or the software.
To operate the system, the engineer is expected to give the tutorial to the user on
the use of the application in other to be familiar with the system develop. The
modules have to be iron out one after the other to the users. Below are the
following steps to operate the system:
Step 1: Install Xamp Server
Step 2: Install Browser eg (Google Chrome or Mozilla Firefox)
Step 3: After installation Launch Xamp Server.
Then navigate through the menu, for more information about the modules read
again the procedures in this project work.
Step 4: type localhost/crime on the browser to view the interface
Step 5: Enable internet accessibility.
Maintenance this program can be done in Window base environment. Any future
modification can be done by re-compiling the source program in development
environment making necessary changes versions of the existing version of the
mini word processing applications.
34
Four.3.4 BENEFITS OF THE SYSTEM
The benefit of the system is that it help Nigeria police force to have proper
documentation of the case handling the station, and make it easier for the head of
the department to easily view the list of the case handle in the station and to
know if the case has been completed or not.
Moreso, the investigation officer can also know if the investigation he or she is
handling has been assigned to another officer through the assigned page in the
system.
35
CHAPTER FIVE
Five.1 SUMMARY
In summary, online crime reporting system is online web based system to solve
the problems of all the common man. Overall, the Online Crime Reporting
System project is an essential step towards improving the efficiency and
effectiveness of law enforcement in managing crime. It aims to provide a
centralized system for managing police station operations and empowering
citizens to participate in the justice system by reporting crimes quickly and
easily. The primary objective of this project is to provide a user-friendly
interface for individuals to report crimes and monitor the progress of their case.
By providing a digital platform to register complaints, the project aims to make
the process more accessible and convenient for individuals, reducing the
paperwork required. The system also provides an efficient way for law
enforcement officials to manage cases, track criminals, and monitor the latest
information about crimes in the city.
Five.2 CONCLUSION
Five.3 RECOMMENDATION
37
REFERENCES
ACCES S.2019.2904800
100330.
applications.
38
Springer, Cham, pp 187–196. https ://doi.org/10.1007/978-3-
319-28031 - 8_16.
doi: 10.1007/s10278-018-0145-0.
doi: 10.1053/j.sult.2020.08.014.
10.1016/j.ebiom.2021.103402.
10.1016/j.mric.2019.07.008.
10.1016/j.ebiom.2020.103121.
39
Jiang, Liang x, Lungan Zhang, Chaoqun Li, and Jia Wu. (2019). “A
Liu, Renyi, Derun Pan, Yuan Xu, Hui Zeng, Zilong He, Jiongbin Lin,
08195-z.
40
41
Appendix A
Start
No
Do you Create Account
Have Account
Yes
Enter Username
Enter Password
No
If
Correct
Yes
Dashboard
Report View
Crime Report
Investigate
Crime
Database
Stop
42
Appendix B
<!DOCTYPE html>
<html lang="">
<?php
session_start();
include('header.php');
include('dbconnect.php');
if(isset($_SESSION['staffid'])){
if($_SESSION['role']=='Admin'){
header("Location: admin/");
}
elseif($_SESSION['role']=='CID'){
header("Location: cid/");
}
elseif($_SESSION['role']=='NCO'){
header("Location: officer/");
}
?>
<div class="col-md-3"></div>
<div class="col-md-6">
<div class="panel panel-success">
<div class="panel-heading">
<h3 class="panel-title">Please Login Here</h3>
</div>
<div class="panel-body">
<form class="form-horizontal" action="logincheck.php"
method="post" role="form" >
<div class="form-group">
<label class="control-label col-sm-2" for="un">Staff
Number:</label>
<div class="col-sm-10">
<input type="text" class="form-control" name="username"
id="un" placeholder="Enter Username" autofocus="" required="">
</div>
</div>
<div class="form-group">
<label class="control-label col-sm-2"
for="pwd">Password:</label>
<div class="col-sm-10">
<input type="password" class="form-control" name="pwd"
id="pwd" placeholder="Enter password" required="">
</div>
43
</div>
<div class="form-group">
<div class="col-sm-offset-2 col-sm-10">
<button type="submit" name="login" class="btn btn-
default">Login
<span class="glyphicon glyphicon-check" ></span>
</button>
</div>
</div>
<div class="form-group">
<div class="col-sm-offset-2 col-sm-10">
<?php
if(isset($_SESSION['error'])){
echo "
";
unset($_SESSION['error']);
}
?>
</div>
</div>
</form>
</div>
</div>
</div>
<div class="col-md-3">
</div>
</body>
</html>
44
Appendix C
Homepage interface
45
46
List of Complaint
47
48