Professional Documents
Culture Documents
INTRODUCTION
1.1
With the advance in technology, more in particular in the field of computer organizations a lot of
things are now automated. Web based activities have in recent past replaced virtually every form
of transactions. This is because of the advent of the internet, which provides a global network
connection for all such activities. In line with this trend, the police force needs to join the band
wagon of the global community in shearing the benefits of internet.
A crime diary is a record of a person's criminal history, generally used by police, security
agencies, potential employers, lenders etc. to assess his or her trustworthiness. The information
included in a crime diary varies between countries and even between jurisdictions within a
country. In most cases it lists all non-expunged criminal offenses and may also include traffic
offenses such as speeding and drunk-driving. In some countries the record is limited to actual
convictions (where the individual has pleaded guilty or been declared guilty by a qualified court)
while in others it also includes arrests, charges dismissed, charges pending and even charges of
which the individual has been acquitted. The latter policy is often argued to be a human rights
violation since it works contrary to the presumption of innocence by exposing people to
discrimination on the basis of unproven allegations.
The Federal Investigation and Intelligence (FIIB), is a special outfit of the Nigeria police
force, as a role similar to that of the FBI (Federal Bureau of intelligence) of the United States
(US) information they say is an indispensable force, and if we should go by this maxim, it
buttresses the need at which classified information is to this outfit. Over the years, this outfit had
made tremendous impact in combating crime, but in recent times, there has been an avalanche of
crime wave in the country leading to insecurity of life and properties close investigation
concerning crime activities reveals that this special outfit of the police force is bedeviled with
obsolete equipment.
Despite the glint strides taken by this outfit over the years changing their investigation
and recording equipment to tape storage using cassette as recorder, there are still a lot of
problems which has hitherto, reduced the efficiency of Ebonyi State division police Head
Quarter Abakaliki and other divisions of the outfit throughout Nigeria. The panacea to this may
no doubt; lie in the introduction of a properly designed Web Base Crime Diary System which
will bring the much-desired automation hence, a prerequisite for being a member of the new
world order vis--vis information technology.
1.2
The statutory duty of Ebonyi State Police is crime prevention and intelligence network which is
solely based on information. This information received from conducted investigations, which
should be supplied to the Bureau within minutes using information and communication
technology. But this takes days or weeks and sometimes months if the investigation is carried in
a distant area. The storage medium currently at disposal for information is susceptible to
unauthorized access and damage. Most often, the recorded information is usually not within the
reach when needed. Going by this high level of graft in the country, officers can easily remove
recorded information of a very serious crime activity by mere bribe offer. In view of the above
problems there is a need for a web based system which will correct these abnormalities.
1.3
The aim of this project work is to design a Web Based Crime Diary System that will manage the
crime information of Ebonyi State Division Police Headquater, Abakaliki. The objectives
include:
I.
To build a module that will facilitates the collection of detailed information about the
II.
III.
IV.
history of crime and criminals and store them in the central database.
To build a module that will generate a report of a recorded crimes and criminals.
To build a module where crime record could be queried by the date.
To build a module where police officers from other headquarters can submit crime reports
from their area.
V.
VI.
1.4
With the growth of information technology, the study offers numerous values not only to the
police but also to the society in general. The study will offer the following benefits:
Help the police in Planning by easy access to information and real time statistics
generation
1.5
This research work is limited to a Web Based Crime Diary of Ebonyi State Division Police Head
Quarter, Abakaliki. There is a web site with a centralized database to allow for a real-time
information access and retrieval. The database will capture all the information needed about the
criminal, the time of the crime, location of the crime and information about the police officer
prosecuting the case.
ABSTRACT
In this project work, Web Based crime diary is an online central data filing and organizational
system for police offices. It is a web based application with the capabilities for storing basic
information about crimes, criminals and other parties that may be involved in crimes and crime
scenes. In the manual system of crime record management, the method of information storage is
poor; the system is not capable of handling cases where other police stations can seamlessly take
over cases that was not registered in their own station when the particular police officer/station
handling the case is not available. And information is prone to unauthorized access and damage.
All these problems have been analyzed and a web based solution provided. The database will
capture all the information needed about the criminal, the time of the crime, location of the crime
and information about the police officer prosecuting the case. There is a module for reporting,
uploading crime and tracking crime. There is a wide network environment for shearing real-time
crime and criminal information across. There is also a module where crime record could be
queried by the date. Some modules of the system are only accessible by authorized system
administrator to ensure the integrity of information. All in all, a web based crime diary system
was developed with MySql for the back end which includes mainly the database and php for the
front end.
CHAPTER TWO
REVIEW OF RELATED LITERATURE
2.1
Much aspect of crime investigation and intelligence is achievable with little or no assistance of
the computer. But on issues bothering on information retrieval, storage and general information
management, the application of the computer is indispensable the computer posses some rare
attributes like speed and accuracy, which is an invaluable tool in information retrieval. To
enhance fruitful investigation, and good decision making, reliable information is needed. In
view of this above, we shall in turn x-ray some of the contributions made so far by some eminent
computer scientist including corporate individuals as it bothers on information retrievals and
management.
Reiston (1978) stated computer that computer information retrieval is concerned with the
structure, analysis, organization storage, searching and dissemination of information.
An
information retrieval system operates on one hand with a stored collection of information, and on
the other, with a used investigation deserving to obtain access to the stored item. He further
stated that for a good computer based information retrieval system there is need for designing the
system to extract from the files those items that mostly nearly correspond to existing needs as
reflected in request submitted by the user investigation.
2.2
Sage (1968) In his article Development of information retrieval system, stated that information
retrieval system based on computer involves collection of people, procedure and equipment
designed to collect record, process, store retrieve and display information.
He further
highlighted that only system that contains digital computers as integral parts are considered, so
that there could be a distinction between a manual system and a computer based information
retrieval system (CBIRS). It is important to retrieval at this point that information retrieval
system does not only bother on storage, searching but also involves information management for
proper decision making.
In view of the above assertion, Benjamin (1991), in his article Computer Industry
challenges in information system described management information as a network of computer
based data processing procedures developed in organization and integrated as necessary with
other manual, mechanical and other electronic procedures for the purpose of providing timely
and effective information to support decision making and other necessary management function.
Ezeano (1995) supported Benjamin by stating that database in centrally located file
involving the operational data of an organization and through which good decision based for
any organization to keep abreast with current events, such organization must have a solid data
based so that the organization will stand firmly in management.
2.3
Proper maintenance of Police Station records is a pre-requisite for the smooth functioning of a
Police Station. These records are of immense help in the prevention and detection of crime and in
keeping track of the movements of criminals. Since these records are of paramount importance, it
is the duty of an Officer Incharge of a Police Station to ensure that these reocrds are safely kept
and do not deteriorate from damp, vermin or other causes. Every Police Station register is
required to be paged in English. No page should be torn out of a register. Any correction required
to be made should be made by drawing a line through the mistake so as to leave the words erased
and by writing the corrected words afterwards or in the margin. A piece of paper should not be
pasted over a mistake. All entries should be neatly and clearly written and all the corrections
should be attested by the signature of the officer making them.
2.4
However, in an attempt to define the wonders of computer and the implication of using a
computerized system in information retrieval, Becker (1963), in his book Information storage
and retrieval using computer tools elements, theories pointed out that a computer is very fast, it
can perform in a single second the amount of work that a human being would require one full
year to achieve. He further cleared that a computer is not a magical device. It has to be
instructed on what to do and in what sequence. If the officers supply incurred information to a
computer, the computer will definitely give an incorrect output (GIGO), thus supporting the
theory of Garbage in garbage out.
concluded that information retrieval cannot be based only on storage and up updating rather there
is need for information security so that collected information can be protected. Applying this to
Nigeria police force investigation conducted concerning a particular case or issue if not protected
can not be retrieval when such investigation are needed. The paper defined information security
as the protection of information from accidental or disclosure to unauthorized person from
unauthorized modification.
2.5
The power and usefulness of internet is its application in the diverse area of human endeavor.
And there is great belief that web based application is changing the organizational operations.
Many writers have helped to bring on the uses and application of computer system as well as the
problem they have planned to solve in any user environment.
According to Mbam (2009) to lack the knowledge of internet is as bad as not knowing
how to read and write. Internet is translating individuals and organizations ways of doing things.
It has come to stay. In view of the above, internet can be applied in the police crime management
and processing system for speed and efficiency
In his own rendering, Mbam (2009) opined that from the impact of internet, it is obvious
that the world would be a different place today if the internet never existed. The internet has
tremendously transformed the world into a global village. Its effect has made life very easy, and
complex tasks can now be accomplished at a click of a mouse button. It is therefore difficult to
find someone who has not heard about the word internet before. Its effect and popularity have
spread among individuals like a rampaging tropical storm. From this, the application of a web
based system in the management crime investigation and processing will produce accurate result.
2.6
Goldberg (2010), a criminal record will be created after sentencing because of a violation or
crime. The record will exist for 5 years in case of violations or 20 years for crimes. If the
sentence is three years of imprisonment or longer, 30 years will be added at the time the criminal
record will be stored. A traffic violation will not be stored in a criminal record, unless there will
be a trial. Normally the traffic fine is given by a police officer, and the payment is generally done
by banking. There won't be a trial, nor an addition in a criminal record. In case of sexual crimes
the criminal record will be destroyed after 80 years.
2.7
FSL is the testing laboratory of the police department with its laboratories at national and state
levels which conducts various tests on the requests coming from the police department and other
Government departments. This module captures the administrative functionality of the FSL Unit
as a whole. This involves capturing and maintaining the information of the cases registered in
FSL on request from police station or otherwise, flow of the case through the different sections in
FSL, status of the case at each point of time till its final disbursement back to the requested unit.
It also captures the various other day-to-day activities of FSL like scene of crime requisition,
court duty attendance and ammunition and equipment usage.
CHAPTER THREE
METHODOLOGY AND SYSTEM ANALYSIS
Research methodology is the specification of the procedures for collecting data and analyzing
data necessary to define or solve the problem for which the research is intended to. The system
under investigation is the Abakaliki Police Divisional Headquarters and this involves how the
crime data are collected and other processing activities that go on in the police station.
3.1
Top-down decomposition requires identifying the major higher-level system requirements and
functions, and then breaking them down in successive steps until function-specific modules can
be designed. Thus, top-down design is a level-oriented design approach. Top-down design directs
designers to start with a top-level description of a system and then refine this view step by step.
With each refinement, the system is decomposed into lower-level and smaller modules. Topdown design reduces the scope and size of each module, and focuses more on specific issues.
For the purpose of this study top down will be used because of its numerous values such
as: modularization, easy debugging and program modules can act as a building block for
developing other programs.
3.2
FACT FINDING
Fact finding is the process of identifying the application and implication of the system for the
bureau. To the successful actualization of this, approval was given by the inspector in-charge of
the police division command. With regards to collection of relevant facts, which are reliable and
unbiased, the researcher employed the following methods:
interview method
observation
examination of documents
INTERVIEW METHOD
This method has widely been employed by most authors and in fact, the most productive
technique. It is a technique, which involves collecting facts through discussion the interview
session between the researcher and the higher and lower officers of the police. This method did
however, offer the author the opportunity of having a face to face communication with the
people concerned.
It also provided the much needed response as regards the areas under
investigation.
OBSERVATION
This method makes room for confirmation on the interview granted, and possibly, creates the
opportunity for conclusions to be made as operations are observed. It is imperative to point out
that this method is best, if employed in conjunction with other techniques as implemented by the
researcher. Officers were seen carrying files, and transferring files from one office to another.
Movement of files could also lead to loss of important documents.
EXAMINATION OF DOCUMENTS
This is the most essential area whose need is required as to ascertain the specific area where
computer services could be needed. To this end, the researcher examined some of the documents
used in the entering of conducted investigation manually, the heap of wasted material as a result
of poor storage. The author also took a closer examination of the intelligent report form. This
examination helped the author to fathom the possible procedures for each operation. The
questionnaire was not used in the cause of investigation for the research work, due to the
following reason.
The time schedule for the study was so short hence the researcher could not meet up with
the necessary preparations involved in the presentation of the questionnaire.
3.3
System investigation and analysis is concerned with the study of the existing system with a view
to discovering its strength and weakness and possible make strategies to eliminating such
weakness in the new system design. The area investigated upon was the Ebonyi State Police
Divisional Headquarter which is in charge of information. The operates based on manual
approach. It is a system whereby the officers incharge of crime record it manually in a register
and anytime the station needs to make reference to any particular record, they will bring the
registers and search for the case manually. This method is stressful and information is prone to
damage and attack.
3.4 INPUT, PROCESS, OUTPUT
Analysis of the input process and output of the existing involves examining the document which
serves as input into the send and finally, what is the out of this processing (investigation /
confirmation) upon which a decision can be acted upon.
INPUT
The input into the current system is the intelligent report form, which is used in collecting data
from conducted investigation an surveillance by officers of the system.
This information
collected serves as raw for the intelligence department for effective processing.
PROCESS
The current system is entirely bereft of the numerous benefits of computerization, as information
collected is rather processed manually. This is the duty of the intelligent department. What they
do is to study facts and analyze the information (report) collected from investigation depending
on the nature of the crime.
OUTPUT
The output from the current system is dependent on the facts drawn from the analysis of the
information derived from conducted investigation by the intelligence department. This could be
of two types:
OUT PUT of an investigation with suspect Output of an investigation without suspect Output
for the former includes the following: name, address, sex, date occupation signature, and
investigation base and report confirmation.
This information flow diagram shows how information is being disseminated within the system.
This also depicts the information requirement of each department that makes up the system.
PROCESSING AND ANALYSIS HAVE THE DATA COLLECTED FROM THE CONDUCTED INVESTIGATION
FIG. 1
From thorough investigation, the current system has been observed to be bedeviled with the
following teething problems, which need re-modification. The manual system involved in file
processing and management seems tedious due to the long procedure involved.
-
Error prone
Some vital information get lost due to over handling of files by hand.
There are no backups in situations where important files or records get lost.
3.7
From all the revelation of the inherent problems in current system, it becomes obvious that for
such a very sensitive outfit of the police force there is the need for its entire system to be
revitalized, to keep abreast with the time and subsequently, reap the numerous benefits offered
by fantastic features of information technology, which is lacking in the current system. Hence a
computerized information retrievals system is proposed. This proposed new system would
achieve the following:
-
Provision of information which are more accurate, timely and readily available at
any point in time for bureau analysis
It will provide storage for large volumes of information without occupying space.
DIVISIONAL INSPECTOR
ACCOUNTS STAFF
IN CHARGEINSPECTOR
FOR CRIME IN CHARGE OF FRAUD
INSPECTOR IN CHARGE OFINSPECTOR
INTELLIGENCE
3.8
ORGANIZATIONAL STRUCTURE
CRIME INVESTIGATIONFRAUD
STAFF INVESTIGATION STAFF
INTELLIGENCE STAFF
Fig 2
The figure above represents the organizational structure of Ebonyi state divisional police
headquarter.
CHAPTER FOUR
SYSTEM DESIGN
Having looked at and studied critically the old system with its deficiencies, then a system
specification and a design which was developed to meet the user requirement for an efficient web
based Crime Diary system is developed.
4.1
4.2
SYSTEM SPECIFICATION
This section shows the requirement of the system and what it is supposed to contain for effective
design.
4.2.1
Add new suspect: to display a form that enables a new suspect to be added to the system.
Administrator login: to login an administrative staff or the CEO admin to perform
administrative functions.
Update suspect: enables a suspect information to be updated in the system.
Search/Print: enables the administrator to search and print report s in the system.
View: to view a suspect based on the offence or to view all the suspects in the system.
Logout: enables the admin to logout of the system.
4.2.2
It is the specification for the user interface which is also path of the software that the user
interacts with, whether it is for input or output purposes.
4.2.2.1
The output form here is the form that shows the details of the input processed by the Web Based
Crime Diary. The output form is the View All Suspects; which allows all the suspects recorded in
the system to be viewed. The field here includes:
4.2.3
Fullname
Nick Name
Offence
Date of Status
Database specification
There is a database named Crimediary to handle all the details of the Web Based Crime Diary
system. The database will be stored in Wamp server which will contain MySql as the database
management system. It has three tables, they includes:
a. Admin: this table has the information needed for any admin staff to login. The fields in it
includes:
Id
Int(11)
Username
varchar(20) null
Password
varchar(20) null
b. Activities: this table contain all the information concerning any crime and suspects that is
recorded in the system. The fields here include:
Id
int(11)
Fullname
varchar(200)
Nickname
varchar(200)
Offence
varchar(200)
Age
varchar(3)
Phone_no
varchar(20)
Date of activities
varchar(200)
Activities
varchar(2000)
User_Id
Int(10)
Image
varchar(2000)
Year
varchar(200)
Date
Int(3)
Day
Int(5)
null
null
null
null
null
null
null
null
null
Month
Int(5)
c. Bh: this table contains the details of a recorded suspect. The fields here are:
Id
int(11)
Fullname
varchar(200) null
Nickname
varchar(200) null
group
Offence
varchar(200) null
Age
varchar(3)
null
Phone_no
varchar(20) null
Date of activities
varchar(200) null
Image
varchar(2000) null
4.2.4
The program module specification describes the specification of what the program would do to
enhance good design guide during the process. As it concerns this particulars application
package, it describes different activities involved in the program modules. The classifications of
the modules are vividly described under the subsections below.
There are total of five modules in this system specified according to their functions. They
include:
i.
view: this enables the system administrator to view a suspect or all the people registered
ii.
in the system.
Search/Print: this module allows suspects information to be searched and printed in the
iii.
iv.
v.
system.
Update Activities: this module allows activities to be updated in the system.
Update Suspect: this module allows the suspects information to be updated in the system.
Add New Suspect: this module allows the admin to register new suspect in the system.
4.3
SYSTEM DESIGN
4.3.1
This subsection is responsible for contents in the main menu interface. Based on the fulfillment
of this project application package software, the main menu was designed to have a link to all the
form interfaces within the application. The figure below has a descriptive explanatory diagram of
the sketch of the main menu design. Different information that will enable the user, understand
the procedure as well as a guide for the software.
VIEW
SUSPECT BY OFFENCE
ALL SUSPECTS
4.3.2
DATABASE DESIGN
We have one database know as Crimediary. Our database constitutes of tables that is made up
of fields of different field types and sizes. They include:
Table 1Admin table
S/N
1
2
FIELDNAME
USERNAME
PASSWORD
FIELDTYPE
VARCHAR
VARCHAR
SIZE
20
20
CONSTRAINT
-
NULL
NULL
ID
INT
11
FIELDTYPE
INT
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
INT
INT
INT
INT
SIZE
11
200
200
200
200
200
200
2000
200
200
3
5
5
5
CONSTRAINT
-
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
FIELDTYPE
INT
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
VARCHAR
SIZE
11
200
200
200
200
200
200
2000
200
200
11
CONSTRAINT
-
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
NULL
FIELDNAME
ID
FULLNAME
NICKNAME
GROUPS
DATE
MONTH
YEAY
IMAGE
NATIVE
AGE
A_DAY
A_YEAR
A_DATE
USER_ID
FIELDNAME
ID
FULLNAME
NICKNAME
GROUPS
DATE
MONTH
YEAY
IMAGE
NATIVE
AGE
PHONE
DOCUMENT
PROCESS
VISUAL DISPLAY
DOCUMENT
Start
DISPLAY MENU
Is Password
Correct?
(1) search
(2)view
(3)add new
suspec
(4)update
End
YES
IF OPTION = 1
YES
IF OPTION =2
YES
IF OPTION =3
YES
IF OPTION =4
END
SYSTEM IMPLEMENTATION
Here, we proceed from the design of the new system to a working version of the fundamental
program solving techniques. The software is structured in such a way that each subsystem is
selected and executed independently. The tasks is divided into several sub tasks, which comes
together to give the solution to the problem.
This section also went ahead to explain vividly the implementation of the designed
system and the code that achieve the actual instruction. Pseudo codes are used to show the
structure of the coding while actual coding are done using the chosen programming language
(Hypertext Preprocessor) in the implementation of every module of the project.
The following can be used by the system to fulfil its functions:1) Use of Microsoft windows operating system (Window XP and above).
2) Use of HyperText Preprocessor
3) MySql
5.1.1
LANGUAGE OF IMPLEMENTATION
PROCEDURE
ACTION-PSEUDO CODE
LinkAddNewSuspect_Click
LinkUpdate_Click
linkUpdateActivities_click
linkHome_Click
BtnRegister_click
BtnLogin_Click
5.1.3
Database Implementation
The database is implemented using MySql statement in the query analyser tool in the wamp
server application. The database implementation contains all the sql data manipulation language
(DML) that is used to modify the data present in the database.
5.1.5
Module Implementation
The modules were implemented using hypertext preprocessor (PHP) programming language and
it was done using top-down methodology. The pseudo codes below represent the structure of the
coding.
Module Administration
There are different sub-systems but the one that would be discussed here is the student
registration centre procedure, this only show the structure of the coding.
1. Admin home page shows
2. Load the login form
IF the admin enters incorrect username or password, then an error message shows.
User has the choice to go back to step 2 or close the page.
3. Open the home page of the system page.
4. perform administrative functions.
If the admin wants to edit any particular field , then click on edit
5.2
SYSTEM TESTING
Software testing is a critical element of software quality assurance and represents the ultimate
review of specification, design and coding. In this section we will discuss software testing
fundamentals and techniques used in the test plan and test data required for the performance and
evaluation of such test.
5.2.1
Test Plan
The test plan used in this project testing and integration was to test the modules, followed by the
subsystems and the main menu separately. Integrating the whole parts i.e main menu, subsystems
and modules together followed by the individual testing. Generally, the testing was done in three
parts; unit testing, integration testing and final testing.
5.2.2
Test Data
The data collected from the students as specified in the system analysis section were used to
produce the test data used in this system. The table below shows the test data of the system.
Table 5.2
Test data
Add new Suspect
Expected result
Actual result
Expected to see the add new The add new suspect form was
Admin Login
suspect form
displayed.
Expected to see administrator Administrator access area was
Update Suspect
restricted area
displayed
Expected to see the update Update suspect
Update activities
suspect form
displayed
Expected to see the update The update activities form was
activities form
displayed.
form
was
Search/Print
search
form
View
suspect area
displayed.
Expected to see area that Suspects information
was
was
5.2.3
Test Result
The test results were gotten based on the values supplied to the system. The accuracy of the
program was tested with some varying data. This gives the assurance that the new system with
achieve its purpose and objectives.
5.3
SYSTEM DEPLOYMENT
This stage is also known as crossover stage. This is the stage in which all theories are turned into
practice. It is a means of changing from the manual system to the automated system. There are
various methods of crossover process, they include:
5.3.1
implemented simultaneously for a certain defined period and their outputs/results are compared
periodically and likely differences are fixed on the new system until all users are satisfied. The
old system has to be discontinued when differences are seen to have seized arising. Its advantage
is that is that it builds users confidence especially during the parallel run. The disadvantage is
that it is expensive running the manual and computer-based system simultaneously for a defined
period of time.
5.3.2
considerable period of time. When the outputs are found suitable, then another part is
implemented. Its advantage is that it allows easy tracing of errors and debugging since
installation are done in parts. Major disadvantage here is that it takes a long time to complete the
installation of the various parts of the system.
5.3.3
This is where the manual or old system is completely replaced by the new system. One of the
major advantages here is that it saves cost in the sense that it is only the automated that runs at a
particular point in time. It is also easy to directly change over to the new system. This is the
method that will be adopted in this system.
CHAPTER SIX
SUMMARY AND CONCLUSION
6.1
SUMMARY OF ACHIEVEMENTS
The success of all these operations was based on the analysis of the current system and testing
processes carried out during the system process.
6.2
During the feasibility study, Analysis and designing of this application package, a lot of sets back
were encountered. But after a much head long way, the solutions were found. The table below
gives the summary of the problems and the solutions adopted
Table 6 Problems Encountered and Solution Adopted
PROBLEM ENCOUNTERED
The
most
difficult
was
the
SOLUTION ADOPTED
hiding
information by the various units of the the Head of Departments and had an
departments that I encountered. Some, if not agreement that I must not publish any
all, believe that the success of investigative information on papers outside my project
work is based on secret.
work.
Some of the officers believed that their job is This problem was resolved by briefing these
at risk if the management implements the new individuals about their state of job and
system after its creation, so they refused to educating them about the importance of being
corporate with me as at when due.
VI.3
computer literate.
CONCLUSSION
The need for achieving efficiency and consistency information processing and analysis for every
organization can not be over emphasized. The manual method employed by this outfit over the
years has been bedeviled with problems ranging from inefficient processing, loss of information,
inaccurate computation, poor storage and authorized access to stored information. These
irregularities however, call for immediate implementation of a computer based system, which
has effective.
The software has been designed to address issues of irregularities if followed and handled
properly. However in implementing the system, adequate strategies and role perception might be
adopted by those responsible for implementing the new system. This is necessary so as to
forestall hostility and antagonism by the users of the old system. Since the new system is built
around these users the benefit of computer in many aspects and organization are therefore
necessary to abolish the misconception that the computer is a displacement of man, but rather his
complete.
Therefore, for quick decision making in Ebonyi state Division Police Head Quarter,
Abakaliki, the application of a computer based information retrieval approach is a must.
REFERENCES
Becker, R. (1963). Testing the leading crime theories: an alternative strategy focusing on motivational
processes. Journal of research in crime and delinquency, 32, 363-398.
Bbenjamin, r. (199). The Psychology of Criminal Conduct: Theory, Research and Practice. Toronto:
John Wiley & Sons Publications.
Ezeano, a. (1995). The Changing Definition and Image of Crimes in Popular Discourse. International
Journal of the Sociology of Law, 24, 229-251.
Goldberg, s. (1996). Computer Crime Diary in the Global Village: Strategies for Control and
Regulation- in Defence of the Police Force. International Journal of the Sociology of Law, 24,
221-228.
Mbam, chukwuma (2009). Internet Made Easy. Enugu: Our Saviour Press Limited
Reiston, p. (1978). The Psychology of Crime a Social Science Textbook. Cambridge: Cambridge
University Press.
Sage, j. (1997). Analysis of Security Incidents on the Internet. Unpublished Doctoral Dissertation,
Carnegie Mellon University, Pennsylvania.
Tandels, d. (1994). Recombinant Culture of Police Investigation Processes: Crime in the Digital
Network. Available http: www.cpsr.org/privacy.
Uttman, j. (1997). The Watchman: the Twisted Life and Crimes of Serial Hacker Kevin Poulsen.
Toronto: Little Brown & Company Intl.
Vizrach, s. (1997). Is There a Controlled Crime Management System for the 90s? Available Http:
Hostname: Infowar.Com.