0% found this document useful (0 votes)
86 views44 pages

Security Information System

This document describes a proposed project to design and implement a criminal face identification system for the Nigeria Police Force. It aims to transform the existing manual information system into an automated database system to enhance security, information storage, and tracking. The current manual system is problematic due to issues like poor criminal statistics, long waiting times to retrieve records, inaccurate reports, unsecured access to records, and mishandling of files. The proposed computerized system would address these problems by providing quicker access to data, faster case processing, and more secure information in a readily comprehensible format for police work. The scope of the project is to develop an online interactive system to efficiently store and manage records of staff, informants, witnesses, and accused persons
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views44 pages

Security Information System

This document describes a proposed project to design and implement a criminal face identification system for the Nigeria Police Force. It aims to transform the existing manual information system into an automated database system to enhance security, information storage, and tracking. The current manual system is problematic due to issues like poor criminal statistics, long waiting times to retrieve records, inaccurate reports, unsecured access to records, and mishandling of files. The proposed computerized system would address these problems by providing quicker access to data, faster case processing, and more secure information in a readily comprehensible format for police work. The scope of the project is to develop an online interactive system to efficiently store and manage records of staff, informants, witnesses, and accused persons
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 44

DESIGN AND IMPLEMENTATION OF

CRIMINAL FACE IDENTIFICATION SYSTEM

BY

OKOTIE DAVID VIVIAN


MAT. NO: ICT/525160354

BEING A PROJECT SUBMITTED TO THE DEPARTMENT OF


COMPUTER SCIENCE SCHOOL OF INFORMATION AND
COMMUNICATION TECHNOLOGY, AUCHI POLYTECHNIC, AUCHI
EDO STATE.

IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE AWARD


OF NATIONAL DIPLOMA (ND) IN COMPUTER SCIENCE.

OCTOBER, 201
CERTIFICATION

I the undersigned hereby certified that this project work was carried out by
OKOTIE DAVID VIVIAN with matriculation number ICT/525160354 to the
department of Computer Science, Auchi Polytechnic, Auchi.

I also certify that the project work is adequate in scope and quality in
partial fulfillment for the award of National Diploma (ND) in Computer Science.

…………………………………………………….. ……………………………………...
MR. UMORU JOSEPH DATE
(Project Supervisor)

……………………………………….. ……………………………………….
MR. BAYO ADEDEJI DATE
(Head, Department of Computer Science)
DEDICATION

This project work is dedicated to God for His love, guidance, inspiration

and enablement of this project work.


ACKNOWLEDGEMENT

I sincerely express my profound gratitude to God almighty for the initiative,


grace and strength throughout my publication of this project work.

My greetings and gratitude goes to my beloved parents Mr. And Mrs. OKOTIE as
well as my siblings, uncles and aunts for their insight, inspiration and motivation
for providing and enabling the writing of this project possible.

I am grateful to my project supervisor MR. UMORU JOSEPH who despite his tight
schedule of his duties still patiently took time to read and made necessary
correction. I want to say Sir, your useful suggestion and comment have been
carefully considered and acted on.

To my H.O.D Mr. BAYO ADEDEJI, and staffs of department computer science


who contributed to my academic success, I say God bless you all.

May God almighty richly bless and reward you all amen.
TABLE OF CONTENTS

Title Page i

Certification ii

Dedication iii

Acknowledgement iv

Table of content v

Abstract vi

CHAPTER ONE

1.0 INTRODUCTION 1

1.1 Statement of problem 1

1.2    Objective of the study 3

1.3 Definition of terms/variables 4

CHAPTER TWO: LITERATURE REVIEW

2.1 Security Information system 6

2.2 Information security 8

2.3 Cia as Information Security Watchword 10

2.4 Risk Management in Information Security 11

2.5 The Relevance of Cryptography to Security Information 12

2.6 The Concept of “Due Care” In Security Information 14

CHAPTER THREE: ANALYSIS OF THE EXISTING SYSTEM


Fact finding method 16

3.2 Organizational structure 18

3.3    Objectives of the existing system 19

3.4 Input, process, output analysis 20

3.5 Information flow diagram 22

3.6 Problems of current system 24

3.7 Justification for the new system 24

CHAPTER FOUR: DESIGN AND IMPLEMENTATION OF THE NEW SYSTEM

4.1 Output specification and design 26

4.2 Input design and specification 27

4.3 File Design 29

4.4 Procedure chart 31

4.5 System flowchart 32

4.6 System requirement 33

4.7    Program flowchart 34

CHAPTER FIVE SUMMARY, RECOMMENDATION AND CONCLUSIONS

5.1 Summary 35

5.2 Conclusion 35

5.3 Recommendation 36

REFERENCES 37

APPENDIX II 38
ABSTRACT
The principal objective of this project is to help Criminal Face Identification
Systems. which is my case study in the area they encounter problems in securing
security data-processing and efficient information system. This will be the
solution given to handle this problem by transforming the existing manual
information system into an automated form and overcome the existing problems
of insecurity and delay in data processing. I decided to use an automated
database system to enhance information storage and keep track of security
information. Again, doing this will ensure that there is an effective security
information system computerization. To achieve this, Visual Basic 6.0 is used for
its implementation.
CAHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE STUDY
Information system occupies a vital and unique position in any
organization by virtue of the data and information, which it contains. Security of
information is of great importance to any given organization this makes the
information reliable since information stored can be referenced whenever
necessary access by unauthorized persons (Allen, 2007).
This project analysis the activities and importance of securing information
in any organizations and to see that the information is accurately maintained to
help the management in decision making and control of the diverse activities of
the organization
The Nigeria police force is responsible for security of live and property and
as a result keeps record of vital information given to them by any informant so
as to enable them arrest activities or scenes unpleasant to people residing in a
particular district (Saliu, 2016).
Therefore, for effective administration and management, the provision of
computer based information security for every source station is certainly
inevitable, since it will take care of all the problems and inadequacies of the
manual system (Saliu, 2016).

1.2 STATEMENT OF THE PROBLEM


In spite of the level of computation of various organizations, this particular
organization on discussion is still at the grass root level. It requires a certain
degree of protection especially of vital equipments, properties and information
and this cannot be realized through the current system of operation, which is the
manual system.
With the increase in criminal cases in the state, the above method has been

proven very difficulty and tedious to work upon. The problems faced here are:

1. Poor statistical about a particular criminal: This may be as a result

of lost or misplaced criminal files.

2. Longer waiting time: The record clerk wastes so much time in bringing

victim folders. In case the management needs the record for a particular

victim, it takes the clerk time to manually organize the data and bring it to

the destination where it is needed. Thereby contributing to time wastage.

3. Inaccurate victim report: Sometimes victim report are not properly

stated and reported. This results to questionable report being sent to

management for planning.

4. Mishandling of victim folders: Victim folders are often handled with

little or no regard. This leads to detaching and tearing away of some of the

staff information.

5. Unrestricted Access to Victim/Criminal Records: Due to poor

security checks in most Police Stations, victim records which are main be

confidential are exposed to unauthorized persons.

1.3 PURPOSE OF THE STUDY


The purpose of this study is to provide a computer based, on line and
interactive package that will accurately and efficiently record all data and
information about staff, informers, witnesses and accused persons.
It will also eradicate the numerous problems associated with the manual
technique of securing information in order to facilitate the transfer and retrieval
of information between the various departments of the organization,

1.4 AIMS AND OBJECTIVES


The aim of this research work is to design and implement information system
that can be developed by Nigeria Police Force.
In order to achieve the above aim, the following objectives were considered:
1. Higher security efficiency of information
2. Quicker access to individual data
3. Faster treatment of information security oriented cases.
4. Provision of output information in a readily comprehensible form to those
persons involved in the activities of the organization. Provision of
communication channels.

1.5 THE SCOPE OF THE STUDY


The study of computerized Security Information System is important

mostly in present generation, because it intend to solve the problem of manual

collection, organizing and tracking of criminal’s records.

This project will therefore go a long way reducing the stress involved the

manual process of Security Information System as well as managing records as


all the admin has to do is enter these various victim’s details into the system and

the system handles the rest of the operation.

1.6 LIMITATIONS
A lot of militating constraints were encountered during the course of this write
up. They are:-
 Inaccessibility to some documents, which arose due to security, imposed on
some of the organization documents by the management. It was not also
possible to make an in-dept study of these documents, which would have
helped in the development of the project work.
 Time was a major limitation to this write up, there wasn’t enough time to
study the details of the various field of the information department of the
organization unavailability of textbook needed for this write – up was not
found in the institution library.

1.7 ASSUMPTIONS
For easy implementation of this study some assumption were made.
It is assumed that the software to be designed for the study will help police
stations in the effective storage of vital information.
Finally, it is also assumed that by computerizing this organization,
information security has been implemented to handle their day to day cases in a
better and more organized manner.

1.8 DEFINITION OF TERMS


 Policing: Policing is another way of depicting the police. Anti-policing: Anti-

policing is the society’s social attitude opposed to war between states and in

particular countering arguments based on policism.

 Databases: A systematically arranged collection of computer data,

structured so that it can be automatically retrieved or manipulated. It is also

called a databank.

 National Security: The requirement to maintain the survival of the nation-

state through the use of economic, policing, and political power and the

exercise of diplomacy.

 Information Security: Information systems from unauthorized access,

use, disclosure, disruption, modification, perusal, inspection, recording, or

destruction. Classified Information is sensitive information to which the access

is restricted by law or regulation to particular groups of persons. Security

Management is a broad field of management related to asset management,

physical security and human resource safety functions.


CHAPTER TWO

2.0 LITERATURE REVIEW

The review of information security literature was conducted as outlined by

Webster and Watson, (2004). The authors examined selected papers (no time

period constraint) from the information systems field using keywords capturing

the definition of IS security.

2.1 INFORMATION SYSTEM SECURITY

The objective of an information system security program is to protect an

organization’s information by reducing the risk of loss of confidentiality, integrity

and availability of that information to an acceptable level. A good information

security program involves two major elements, risk analysis and risk

management.

In the risk analysis phase, an inventory of all information systems is taken.

For each system, its value to the organization is established and the degree to

which the organization is exposed to risk is determined. Risk management, on

the other hand, involves selecting the controls and security measures that reduce

the organization’s exposure to risk to an acceptable level. To be effective,

efficient and reflect common sense, risk management must be done within a

security framework where information security measures are complemented by

computer, administrative, personnel and physical security measures (Bayuk,

2009).
Risk management becomes a senior management issue. A balance has to

be reached between the values of the information to the organization on the one

hand and the cost of the personnel, administrative and technological security

measures on the other hand. The security measures put in place need to be less

expensive than the potential damage caused by the loss of confidentiality,

integrity and availability of the information.

Many formal risk analysis methodologies on the market require technical

expertise in the area of information technology and relevant controls and

availability of precise threat frequencies that may be beyond the reach of many

audit offices, at least initially. The objective is to build up over time the

necessary expertise and resources (Ohwofasa, 2013).

2.1.1 Information Security Framework

This research study will build upon the body of work by Shannon and

Weaver and Mason develop a model for predicting IS security success within an

organization. Shannon and Weaver identified three constructs involved in

effective communications. First, the technical level of communications involves

the accuracy and efficiency of the communication system that produces

information. Second, the semantic level relates to the success of the information

in conveying the intended meaning from sender to receiver. Finally, the

effectiveness level is the result the information actually has on the user’s
behavior. Mason adapted the work by Shannon and Weaver in order to relate it

specifically to information systems.

Information security is one element of a security infrastructure and, as

such, should not be examined in a vacuum. There should be a framework of

security policies dealing with all aspects of physical security, personnel security

and information security. There should be clear roles and responsibilities for

users, security officers and the Information Systems Steering Committee. An

information security program should include all aspects of the sensitivity of

corporate information, including confidentiality, integrity and availability. A

program of security awareness should be in place reminding all staff of the

possible risks and exposures and of their responsibilities as custodians of

corporate information (James, 2010).

Information security is a set of measures at the physical, personnel,

administrative, computer and information system levels. They must all work

together. Information security is good management control and shortcomings at

any level can threaten the security at other levels. If personnel security policies,

for instance, are not well designed and implemented, information security could

become very costly or almost impossible to support (ISACA, 2008).

On the other hand, minimal measures at all levels should ensure a

minimum of protection to the information, provided the security risk is

reasonable and accepted by management. There are also situations where


security measures at one level may compensate for security weaknesses

elsewhere. Encryption, for instance, adds an extra layer of protection for data

confidentiality and integrity even in cases where physical, personnel or

administrative security measures may be weak. Encryption remains one last

defence to help prevent a breach of confidentiality or of integrity (Grama, 2014).

In planning for information security, the value of the information to

management and the volume of that information relative to other types of

information have to be balanced against the basic security limitations of the

medium. In many government departments, unless there are extreme

requirements for carrying top secret information on a suitably protected laptop,

the information should simply be created and carried otherwise. For those

departments, the cost and the constraints of the appropriate security controls

and measures may just not be acceptable, given the small volume of information

that needs such protection (Patrik, 2017).

2.2 COMPUTER SECURITY ASSESSMENT PROCESS

Evolution of Information Management In managing information and

applications, an organization goes through four distinct stages, managing paper,

managing automated technologies, managing corporate information resources,

and finally, managing the strategic use of information.


The technology and security challenges are to minimize the time and effort

spent in each stage and to go through the stages as smoothly as possible

(Newsome, 2013)

At the managing automated technologies stage, the users are not

significantly relying on computer applications but are achieving noticeable

efficiencies. At the third stage, managing corporate information resources,

computer security becomes a major concern due to significant reliance on

computer based information and the exposures related to concentration of

information at one place.

2.3 SECURITY MANAGEMENT

One of the Organization’s key resources is its information. The first step to

safe computing is adoption of information and administrative management

policies and measures which embrace principles of good security management:

1. Security protection should be consistent with the value of the information

being protected;

2. Security protection should remain with the information at all times as it is

moved or processed; and

3. Security protection should be continuous in all situations.

2.4 CIA AS INFORMATION SECURITY WATCHWORD


The field of information security has grown and evolved significantly in

recent years. There are many ways of gaining entry into the field as a career. It

offers many areas for specialization including: security network(s) and allied

infrastructure, securing applications and databases, security testing,

information systems auditing, business continuity planning and digital forensics

science etc. For over twenty years, information security has held

confidentiality, integrity and availability (known as the CIA triad) to be

the core principles of information security. There is continuous debate about

extending this classic trio. Other principles such as Accountability have

sometimes been proposed for addition-it has been out that issues such as Non-

Repudiation do not fit well within the three core concepts, and as

regulation of computer system has increased (particularly amongst the

Western nations). Legality is becoming a key consideration for practical security

installations. Don Parker, (2002) proposed an alternative model for the classic

CIA triad that he called the six atomic elements of information. The elements are

confidentiality, possession, authenticity, availability, and utility (John, 2006)

The merits of the Parkerian hexad are a subject of debate amongst

security professionals. Confidentiality is the term used to prevent the disclosure

of information to unauthorized individuals or systems. For example, a credit card

number to be transmitted from the buyer to the merchant and from the

merchant to a transaction processing network. The system attempts to


enforce confidentiality by encrypting the card number during transmission,

by limiting the places where it might appear (databases, log files, backups,

printed receipts, and so on), and by restricting access to the places where it is

stored. If an unauthorized party obtains the card number in any way, a

breach of confidentiality has occurred. Breaches of confidentiality take many

forms. Permitting someone to look over your shoulder at your computer

screen while you have confidential data displayed on it could be a breach of

confidentiality. If a laptop computer containing sensitive information about a

company’s employees is stolen or sold, it could result in a breach of

confidentiality. Giving out confidential information over the telephone is a breach

of confidentiality. Confidentiality is necessary (but not sufficient) for maintaining

the privacy of the people whose personal information a system holds (McCarthy,

2006).

In information security, integrity means that data cannot be modified

undetectably. This is not the same thing as referential integrity in database,

although it can be viewed as a special case of consistency as understood in

the classic ACID model of transaction processing. Integrity is violated when a

message is actively modified in transit. Information security system typically

provides message integrity in addition to data confidentiality. For any

information system to serve its purpose, the information must be available

when needed. This means that the computing systems used to store and
process the information, the security control used to protect it, and the

communication channels used to access it must be functioning correctly. High

availability systems aim to remain available at all times, preventing service

disruptions due to power outages, hardware failures, and system upgrades.

Ensuring availability also involves preventing denial-of-service attacks. In

computing, e-Business and information security it is necessary to ensure

that the data, transactions, communication or documents (electronic or

physical) are genuine. It is also important for authenticity to validate that both

parties involved are who they claim they are. In law, non-repudiation implies

one’s intention to fulfill their obligations to a contract. It also implies that one

party of a transaction cannot deny having received a transaction nor can

the other party deny having sent a transaction.

Electronic commerce uses technology such as digital signatures and

encryption to establish authenticity and non-repudiation (Loukas, 2009).

2.5 THE SECURITY TEAM

Under the leadership of the person in charge of computer security, a

security team is selected. Full commitment by senior management is important if

the team is to achieve its objectives. Its responsibility is to implement the

security policy set out by senior management and to identify changes made
necessary by developments in the organization’s information systems or the

threats that face them.


CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
3.0 INTRODUCTION
In this chapter various sources of data collection methods, interviews and
analysis of the current and the propose system are discussed.
Research methodology talks about the procedure, method or approach
adopted. To carry out a project effectively and efficiently there must be a
method, there must be a procedure. Let’s go on as we see this discussion
detailed in the next sub heading.

3.1 ANALYSIS OF THE EXTING SYSTEM


The existing system is manually carried out. Information on military signals
is stored in an office file. Their personal data are being collected and each
person has a file created for him or her. Search on these files takes time. One
has to go through the whole files in search of a particular record. This is
cumbersome, hence the need for the computerization of the system.

3.2 LIMITATION OF THE EXISTING SYSTEM


Some of system problems faced by the Nigeria Police Force in achieving her
set goal in terms of security information system are stated below;
 Consume time and human labor
 Delay in report processing
 Cost of printing and purchasing paper and writing materials.

3.3 METHOD OF DATA COLLECTION


In the analysis of information system many methods are used in collecting
fact, this methods includes interview, observation, and questionnaire e.t.c.
Because the system is still in it planning stage we use the interviewing ,
observation methods and reference to written text.
3.3.1 INTERVIEW METHOD
This was done between the researcher and the Nigerian police authorities.
Reliable facts were gotten based on the questions posed to them by the
researcher.

3.3.2 OBSERVATION METHOD


By observation, it means that the researcher was watching and recording
the phenomena as they occurred.

3.3.3 REFERENCE TO WRITTEN TEXT


Security information documentations were studied and a lot of information
concerning the system in question was obtained. Some forms that are necessary
and available were assessed. Also internet downloads was made to obtain some
text materials.

3.4 OBJECTIVE OF THE PROPOSED SYSTEM


The primary objective of Security Information system is to properly
examine the victim’s case and also prevent Nigeria Police Force from being
biased.

3.5 JUSTIFICATION OF THE NEW SYSTEM


The new system is design in such a way that it able to meet up and
achieve its set objectives. In the sense that it will be able to overcome all the
problems that was traceable to the old system of operation. In using the system,
it was found that the system was more reliable than the old system which
involves the manual administration of Nigeria Police Force.

3.6 ADVANTAGES OF THE PROPOSED NEW SYSTEM


i. Reduces manual labor
ii. It increases efficiency and save time
iii. Avoid mistakes due to human error
iv. It help to save the organization data both online and offline.
v. Use for generating customer invoices
vi. Producing report on a daily, weekly, monthly and annual basis
3.7 ORGANIZATIONAL STRUCTURE

INSPECTOR GENERAL OF POLICE

AIG AIG AIG AIG AIG AIG


ZONE 1 ZONE 2 ZONE 6 ZONE 3 ZONE 4 ZONE 5

POLICE POLICE POLICE POLICE POLICE


COMMISSIONER COMMISSIONER COMMISSIONER COMMISSIONER COMMISSIONER
ENUGU STATE ANAMBRA STATE ABIA STATE IMO STATE EBONYI STATE

DEPUTY DEPUTY
ASSISTANT
POLICE POLICE
COMMISSIONER OF
COMMISSIONER COMMISSIONER
POLICE
(CRIME)

OTHER DIVIDIONAL DIVISIONAL OFFICER


OFFICERS POLICE OFFICER IN COMMAND
FIG. 1 ORGANIZATIONAL STRUCTURE
The new system is composed mainly of two input forms, they include:-
a) Police Personnel Information Form
b) Signal Form
Police Personnel Information form

ID………………………………………………………………………………………..
NAME…………………………………………………………………………………
ADDRESS…………………………………………………………………………..
DATE OF BIRTH…………………………………………………………………..
SEX…………………………………………………………………………………….
AGE…………………………………………………………………………………..
STATUS…………………………………………………………………………….
HEIGHT………………………………………………………………………………
DATE RECRUITED……………………………………………………………….
QUALIFICATION…………………………………………………………………
DEPARTMENT…………………………………………………………………….
RANK…………………………………………………………………………………
\ OF KIN……………………………………………………………………..
NEXT

Fig: 4.2 Police Personnel Information form


3.8 PROCEDURE CHART

Main Menu

Information Query Report Help Exit

Police Search by Police


Users
ID Information
Guide

FIG 4.4
Search by About the
rank Signal Software
Report
Signal

Search by
Dept
Exit
3.9 SYSTEM FLOWCHART

Security Information

Input from the keyboard Signal information

Processor

Disk storage
Output

FIG 2 SYSTEM FLOWCHART


3.10 PROGRAM FLOWCHART

start

Enter password
Enter password

NO
Valid password?
Valid password?

YES

Select menu options

Option information?
Option information? A
YES

NO
Option Report? YES
Option Report? PRINT REPORT

NO

YES Search Record


Option Search?

NO

Stop FIG 3 PROGRAM FLOWCHART


3.11 OBJECTIVES OF THE EXISTING SYSTEM

The objective of the existing system includes: Collection of police


personnel record Collection of security signals Opening a file for documenting
these information performing manual search on the file cabinet to retrieve
information

3.12 INPUT, PROCESS AND OUTPUT ANALYSIS


3.12.1 INPUT ANALYSIS
The input to the system is the security information form. This form is used
for recording security signals this forms the input to the system.

3.12.2 PROCESS ANALYSIS


The information gathered was processed into a more meaningful format
for entry into the system. These personnel data are processed to find out their
areas of specialization and signal information sent out.

3.12.3 OUTPUT ANALYSIS


The output from the system is generated from the system inputs. More of
the output generated is on personnel record, military signals, etc.
3.13 INFORMATION FLOW DIAGRAM

DATABASE ADMINISTRATOR
AND
DATABASE MANAGER

IG
OF POLICE

AIG OF POLICE
IN THE ZONE

COMMISSIONER
OF
POLICE

OTHER
OFFICERS

FIG.4 INFORMATION FLOW DIAGRAM


3.14 PROBLEMS OF THE CURRENT SYSTEM
Manual system of operation faces a lot of problems which includes: Delay
in data processing Errors in processing Loss of materials to fire incidents,
termites / on transit Insecurity of data.

3.15 JUSTIFICATION FOR THE NEW SYSTEM


The new system will help to solve all the problems inherent in the existing
system. The justification for the new system includes: Timely processing of
security information Error free processing of data Security of information is
guaranteed Signal are received easily.

3.16 FILE DESIGN


There are several data in the database management system software.
This database is made up of several tables for different requirement of
relationship for relational database.
Table structure: administration table contains the administration username
and password.
S/N FIELD NAME DATA TYPE LENGTH INDEX
1 Password

Personal information table: This table contains details of each prospective


students.
S/N FIELD NAME DATA TYPE LENGTH INDEX
1 FIRST NAME Text 25 Yes
2 LAST NAME Text 12 Yes
3 SEX Text 6 Yes
4 VICTIM NUMBER Alphanumeric 12 Yes
5 DATE Numeric 2 Yes
6. NATIONALITY Text 18 Yes
3.16.1 SYSTEM TABLES
This shows the different tables that will be needed for carrying out
computations:
First name Last name Sex Victim Number Date Nationality
Abel Sandra F 00021 01/15 Nigeria
David Hassan M 00022 29/15 Nigeria
Salami Paul M 00023 03/15 Nigeria
Peter Sonia F 00024 03/15 Nigeria

3.17 INPUT/OUTPUT DESIGN


These are digits and character that enter into the system in a raw form for
processing. The input for this project will require data from it user which could
either be a digit, character or any other symbols.
Output to the system, these are the product (processed data) of the input
of the system. They are referred to as the processed input data. They are
information that meets the needs of the user. There is always interaction
between systems; the reaction of the system to its environment is called output.
CHAPTER FOUR

SYSTEM IMPLEMENTATION

4.0 INTRODUCTION

Implementation of the system involves writing a computer program,

testing and eventually change over to the new system. It also spells out how the

entire system or program is and how not works both the arrangement of the

program flowchart and pseudo code and equally the program design itself. The

source program is also attached a well as some print outs from the program.

4.1 JUSTIFICATION OF PROGRAMMING LANGUAGE USED

Program is a set of information written by a programmer in a particular

programming language, which enables particular processes to be performed by a

computer. Programming language is the language used to write computer

program. Some of the programming language are machine language (low level

language), and high level languages. Machine language include; assembling

language. High level language include; Basic, FORTRAN, Visual Basic, COBOL,

VB.Net, CH etc.

The choice of programming language in this project work is Visual Basic

6.0. This language is chosen because of its object oriented nature. Visual Basic

6.0 has functions for dealing with database problems. With Visual Basic 6.0,
records can be sent to database, records can be searched out of database, and

reports for records can be created.

Visual Basic 6.0 is an “ideal programming language for developing

sophisticated professional applications for Microsoft Window. It make use of

Graphical User Interface (GUI) as the name suggests, uses illustrations for text,

which enables users to interact with an application. This feature makes it easier

to comprehend things in a quicker and easier way.

4.2 SYSTEM REQUIREMENTS

The system requirements to aid the efficient and effective utilization the

newly designed software is classified into:

 Hardware and

 Software

HARDWARE REQUIREMENT:

The hardware requirements are:

 32kb RAM memory capacity

 2gb Hard disk capacity

 1.44MB, 512MB (or below) flash disk storage capacity with density format.

 Printer: An EPSON, Hewlett Packed etc with colored printing attribute.

 UPS: This is an acronym for Uninterrupted Power Supply. It keeps the

computer temporarily on for some time after power failure.


 Voltage Stabilizer: This facilitates the regulation of voltage needed by

the computer system in order to avoid electrical damage of the system.

SOFTWARE REQUIREMENT

The Software requirements for this system are namely:

 Microsoft Disk Operating System (MSDOS) and

 Visual Basic

PEOPLE:

The people required to this software are those who have a basic

understanding of computing. That is, computer literacy is criteria for using this

software.

4.3 MAIN MENU SPECIFICATION

Input and output specification

The proposed input/output system modification will be considered under

two headings hardware and software’s specifications.

Hardware Specification

Any IBM compatible with reasonable conventional memory and two drives

will be able to run this software packages. A monitor is required to display the
information while a get or dot matrix printer is needed to produce the hardcopy

of the output information.

Software Specification

The software is developed using Visual Basic 6.0

4.4 SYSTEM TESTING

The installation aspect is to fix the required software and hardware for the

effective operation of the system. When installing the software, one should make

sure that the different hardware of the computer system is functioning also with

the operating system.

The software is placed in a CD ROM drive, and then by installing, a dialog

box will appear on the monitor, which will now guide the user in which step to

take until the installation is perfectly done.

At the testing stag, every statement must be tested to ensure that there

are no errors in program. If this is not done, an error in the program may go

undetected for months and the objective of the system will not be achieved. The

development of software system involves in series of production activities where

opportunities for injection of human facilities are enormous error may begin to

occur at the inception of the process where the objectives may be imperfectly

specified as well as later design and development stages.


Because of human inability to perform and communicate with perfection,

software development is accomplished by a quality assurance activity.

Software testing is a critical element of software development organization, to

expect 40% of the total project effort on testing. Testing a program is the

process of executing a program with an intention of finding error.

Testing a program is the process of executing a program with an intention

of finding error. Testing uncovers different classes of error such as

 Syntax Error

 Logical Error

 Runtime Error

 Compilation Error

When such error is found, it will then be debugged.

4.5 TRAINING AND RE TRAINING OF STAFF

The aspect of training in software development is very important, because in

not done operators will not carry out operations perfectly.

Computer system familiarization seminar should be organized so as to get the

operators acquainted with the operations of the system. Explain all aspect of the

software to the operators.


4.6 CHANGEOVER PROCEDURE

I recommend that the parallel change over method be used. This

procedure will allow the institution to still maintain the conventional files in

the beginning with such a time when the present conventional files should

have been transferred to the new system. This is to guard the staff past

records

4.7 USER MANUALS

Documentation is very important in the development of any software or any

system. This is because documentation makes the system to be open to all

users, and if it not well documented it becomes difficult in its usage.

That is why the system documentation has to be included in the specification

document of the systems.

In making use of the system, the user who wishes to carry out any operations

has to first boot the system. And before using the software, he/she has to make

sure that Visual Basics 6.0 is installed in the system.

 Insert the CD containing the software and then.

 Install. After installation,

 Go to start button below the desktop,

 Go to all programs and then click on,

 User application software for staff records,


 On clicking this, the software will load.

The software is developed in such a way that anybody, whether with the

knowledge of computer or not, he/she can access it. Meaning that the software

is user friendly and is developed in such an interactive manner that any

individual can run it.

FIG 4.1.1 SECURITY SIGNAL REPORT


This diagram displays the reports of activities being carried out at the Police
Station.

FIG 4.1.2 Police Personnel Information


This diagram shows the database of victims.

CHAPTER FIVE
SUMMARY, RECOMMENDATION AND CONCLUSIONS
5.1 SUMMARY
Information in its most restricted technical sense is an ordered sequence
of symbols that record or transmit a message. It can be recorded as signs, or
conveyed as signals by waves. Information is any kind of event that affects the
state of a dynamic system. As a concept, however, information has numerous
meanings. Moreover, the concept on information is closely related to motions of
constraint, communication, control, data, form, instruction, knowledge, meaning,
mental stimulus, pattern, perception, representation, and especially entropy.
The measures adopted to maintain national security in the face of threats
to society has led to ongoing dialectic, particularly in the liberal democracies, on
the appropriate scale and role of authority in matters of civil and human rights.
Tension exists between the preservation of the state (by maintaining self-
determination and sovereignty) and the rights and freedoms of individuals.
Although national security measures are imposed to protect society as a whole,
many such measures will restrict the rights and freedoms of all individuals in
society. The concern is that where the exercise of national security laws and
powers I not subject to good governance, the rule of law, and strict checks and
balances, there is a risk that “national security” may simply serve as a pretext for
suppressing unfavorable political and social views.

5.2 CONCLUSION
For much of police history the armed forces were considered to be for use
by the heads of their societies, until recently, the crowned heads of states. In a
democracy of other political system run in the public interest, it is a public force.
The relationship between the police and the society it serves is a
complicated and ever-evolving one. Much depends on the nature of the society
itself and whether it sees the police as important, as for example in time of
threat or war, or a burdensome expense typified by defense cuts in time of
peace

5.3 RECOMMENDATION
The following recommendations are made:
That this system be implemented by Nigeria police to enable them go into
computerized information system.
Also schools should expose students to some more relevant programming
languages like visual basic so as to enable them carry out their projects on their
own.
Libraries should b well equipped to simplify the work for the students and
especially during the research phase.
These relationships are seen from the perspective of political police
relations, the police industrial complex mentioned above, and the socio-police
relationship. The last can be divided between those segments of society that
offer for the police, those who voice oppositions to the police, the voluntary and
involuntary civilians in the police forces, the populations of civilians in combat
zone, and of course the police self-perception.
Police often function as societies within societies, by having their own
police communities, economies, education, medicine and other aspects of a
functioning civilian society. Although a police is not limited to nations of itself as
many private police companies (or PPC’s) can be used or “hired” by organizations
and figures as security, escort, to other means of protection where police,
agencies, or militaries are absent or not trusted
REFERENCES
Cynthia, A. (2008). U.S. National Security: A Reference Handbook. India:
Pretience Hall. pp.223.

Depuy, T. N. (1992). Understanding War: History And Theory Of Combat .


London:Leo Cooper Inc.

Kayode, F. J. (2003). Governing The Security Sector in a Democratizing Polity .


Niger: Zed Books

MAIER, C. S. (1990). Peace & Security For the 1990’s. New York Oxford
Press.pp.132-134

Olunsegun O. (1980). My Command: An Account Of The Nigerian Civil war .


Ibadan: Heinemann Publishers:

Olusegun O. (2001). Ambiguous Order: Police Forces in African States , Lynne


Rienner. Lagos: Longman Press

Paleri, P. (2008). National Security: Imperatives and Challenges. New delhi: Tata
McGraw-Hill.pp.321.

Romm, J. J. (1993). Defining National Security: The Non-military Aspects. Pew


Project on America’s Task in a Changed World (Pew Project Series) . Council On
foreign relations. pp. 122. California: Thompson Inc.

Scott, R. (1971). The Nigerian Police London: Methuen and Co.pp.332-333.

Taylor, G. M. (1974). The Legitimate Claims o National Security , Lacaste: Yehn


Publishers.

Tucker, T. G. (1985). Etymological Dictionary of Latin. Chicago: Ares Publishers


Inc. pp.112-114.

Yeun, F. (2006). Human Security And The UN: A Critical History, United Nations
Intellectual History project (Illustrated ed.). Indiana University Press.pp.203..

You might also like