DESIGN OF DATAWAREHOUSE TO SUPPORT CRIME TRACKING AND INVESTIGATION CASE STUDY OF ILARO POLICE STATION

0
807

TABLE OF CONTENTS

PRELIMINARY PAGES

Certification…………………………………………………………………………………………………………… i

Dedication……………………………………………………………………………………………………………… ii

Acknowledgement……………………………………………………………………………………………………. iii

Abstract………………………………………………………………………………………………………………….. iv

Table of content………………………………………………………………………………………………………. v

List of figures………………………………………………………………………………………………………….. vi

List of tables…………………………………………………………………………………………………………… vii

CHAPTER ONE INTRODUCTION

  1. Introduction……………………………………………………………………………………………………….. 1
    1. Background of study…………………………………………………………………………………………….. 2
    1. Statement of problem…………………………………………………………………………………………….. 3
    1. Aims and Objectives of the system………………………………………………………………………….. 4
  1. Purpose of the study………………………………………………………………………………………………… 4
    1. Significance of the study………………………………………………………………………………………….. 5
  1. Scope of study……………………………………………………………………………………………………. 5
    1. Research questions………………………………………………………………………………………………. 5
    1. Definition of terms……………………………………………………………………………………………… 6

CHPATER TWO LITERATURE REVIEW

  • Review of related literature………………………………………………………………………………….. 8
    • Combating crime using data mining techniques……………………………………………………. 9
    • Analysis of the existing system…………………………………………………………………………….. 9
    • Method of investigating with existing system…………………………………………………….. 10
    • Limitations of the existing system……………………………………………………………………….. 11
      • Sophisticated crimes in Nigeria…………………………………………………………………………. 16
    • Emerging technology and crime………………………………………………………………………….. 17
      • Crime and criminal tracking network system…………………………………………………….. 18
      • Uses of crime information center………………………………………………………………………… 18
      • Crime information centre…………………………………………………………………………………… 18
      • Crime analysis………………………………………………………………………………………………….. 19
    • Element of crime analysis……………………………………………………………………………………… 20

2.8.1 Crime element…………………………………………………………………………….

2.8.2 Type of crime analysis…………………………………………………………………..

  • Tracking system………………………………………………………………………………………………… 25
    • Information system…………………………………………………………………………………………. 26
    • Importance of crime information system………………………………………………………….. 27

2.9.4 A criminal data warehouse………………………………………………………………………………… 27

CHAPTER 3

3.2.2 Input analysis………………………………………………………………………………

3.2.3 Witness/suspect statement Input system……………………………………………………………… 32

3.2.4 Case file input system……………………………………………………………………..

3.2.5 Crime diary Input system………………………………………………………………

3.5.2 Input specification design…………………………………………………………………

3.7.1 Criminal registration……………………………………………………………………..

3.7.2 Suspect registration…………………………………………………………………………………………….. 48

3.7.3 Report………………………………………………………………………………………

3.7.4 Change password…………………………………………………………………………

CHAPTER 4

4.1 Choice of development tools………………………………………………………………………………. 50

4.2.1 System requirement…………………………………………………………………………………………. 51

4.2.2 Hardware requirement…………………………………………………………………….

4.2.3 People ware personal requirement……………………………………………………….

4.3 System implementation………………………………………………………………………………………… 52

4.4 Unit testing………………………………………………………………………………..

4.4.1 Unit testing…………………………………………………………………………………

4.4.2 System testing……………………………………………………………………………………………………. 53

4.5 System result………………………………………………………………………………………………………… 54

CHAPTER 5

5.1

Summary…………………………………………………………………………………………………………………. 56

5.2 Recommendation……………………………………………………………………………

5.3

Conclusion………………………………………………………………………………………………………………. 56

CHAPTER ONE

  1. INTRODUCTION

It has been globally observed that the crime rate across the world is moving unprecedented rate in the country. The criminals are at the same designing another complicated technique to rule over the law enforcement technique. Crime can be defined as “Any felony or offence of altering false or counterfeit coin of possessing centerfield Gold or silver coin or offense of obtaining goods or money by false pretense or the offense of conspiracy to defraud, or any misdemeanor”. A normative definition view crime as Deviant behavior that violates prevailing norms cultural standards prescribing how humans ought to behave normally”. Boba(2001). The approach considers the complex realities surrounding the concept of crime seeks to understand how social, political, psychological and economic conditions may affect changing definitions of crime and the form of legal law enforcement and penal responses made by society.

In the view of cross and openshaw (1991), crime can also be defined as harmful act or omission against the public which the state wishes to prevent and which, upon conviction, is punishable by fine, imprisonment and/or death. No conduct constitutes a crime unless it is declared criminals in the laws of the country. Some crimes such as theft or criminal damages may also be civil wrongs for which the victim may claim damages in compensation (Oxford Dictionary)

Security countermeasures can be technological or procedural and operational and cover a wide range of sophistication, cost and level of integration. Government should consider measure that are feasible, that address the identified problems and that work within the existing security framework. Government should keep in mind that many countermeasures exist and that a complete feasibility assessment of all alternatives can generate solution that best fit the state’s needs, Measure such as staff training,

DESIGN OF DATAWAREHOUSE TO SUPPORT CRIME TRACKING AND INVESTIGATION CASE STUDY OF ILARO POLICE STATION