TABLE OF CONTENTS
Title Page – – – – – – – – i
Certification – – – – – – – – – ii
Approval Page – – – – – – – – iii
Dedication – – – – – – – – iv
Acknowledgment – – – – – – – – v
Abstract – – – – – – – – vi
Table of Contents – – – – – – – – vii-ix
List of Tables – – – – – – – – x
List of Figures – – – – – – – – xi
CHAPTER ONE: INTRODUCTION
1.0 Introduction – – – – – – – 1
1.1 Background of the Study – – – – – – 1-3
1.2 Statement of the Problem – – – – – 3
1.3 Aim and Objectives of the Study – – – 4
1.4 Significance of the Study – – – – – – 4
1.5 Scope of the Study – – – – – – – 4
1.6 Organization of the Research – — – – – 5
1.7 Definition of Terms – – – – – – 5-6
CHAPTER TWO: LITERATURE REVIEW
2.0 Introduction – – – – – – – – 7
2.1 Theoretical Background – – – – – – 7-8
2.2 Prevalence of Crime in Nigeria Tertiary Institutions – – 8-11
2.3 Overview of the Application of Computers in Crime
Information Management – – – – – – 11-13
2.4 The Concept of Electronic Record Management System – 13-14
2.5 The Need for Electronic Record Management System – 14-15
2.6 Professional Steps Involved in Creating
Electronic Record System – – – – – – 15-17
2.7 Management Information System (MIS) – – – – 17-19
2.8 Review of Studies – – – – – – – 19-21
CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN
3.0 Introduction – – – – – – – – 22
3.1 Research Methodology – – – – – – 22
3.2 Analysis of the Existing System – – – – – 22-23
3.2.1 Disadvantages of the Existing System – – – 23
3.3 Analysis of the Proposed System – – – – – 23
3.3.1 Advantages of the Proposed system – – – 23
3.4 System Design – – – – – – – – 23-24
3.4.1 Input layout – – – – – – – – 24
3.4.2 Output Layout – – – 25
3.4.3 Algorithm – – – 26
3.4.4 Program Flowchart – – – 27-31
3.4.5 Database Design – – – – – – 32
3.4.6 System Architecture – – – – – – 32-33
3.4.7 Use Case/Class Diagram- – – – – – – 33-35
CHAPTER FOUR: SYSTEM IMPLEMENTATION AND DOCUMENTATION
4.0 Introduction – – – – – – – 36
4.1 System Design Diagram – – – – – – 36
4.2 Analysis of Modules – – – – – 37
4.3 Choice of Programming Language – – – 37
4.4 Programming Environment – – – – – 38
4.4.1 Hardware Requirements – – – – – – 38
4.4.2 Software Requirements – – – – – – 38
4.5 Implementation – – – – – – – 38-39
CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.0 Introduction – – – – – – – – 40
5.1 Constraints of the Study – – – – – – 40
5.2 Summary – – – – – – 40-41
5.3 Conclusion – – – – – – 41
5.4 Recommendations – – – – – – 41
References – – – – – – 42-43
Appendix A (Source Code)- – – – – – 34-54
Appendix B (Output) – – – – 55-59
LIST OF TABLES
Table 3.1: Output Layout – – – – – – 25
Table 3.2: Database Design – – – – – – 32
LIST OF FIGURES
Page Number
Fig 3.1: Crime Registration input layout – – – 24
Fig 3.2: Login flowchart – – – – — – 27
Fig 3.3: Main menu flowchart – – – – – 28
Fig 3.4: Crime registration flowchart – – – – 29
Fig. 3.5: Update crime record flowchart – – – 30
Fig 3.6: Query crime database flowchart- – – – 31
Fig. 3.7: System Architecture – – – – – 33
Fig. 3.8: Use Case Diagram – – – – – 34
Fig. 3.8: Class Diagram – – – – – – 35
CHAPTER ONE
INTRODUCTION
1.0 Introduction
This chapter focused on the introduction to electronic crime documentation system for school to school peace initiative (SPI). It also presents the background of the study, statement of the problem, aim and objectives of the study, significance of the study, scope of the study, organization of the research and definition of terms. An electronic crime documentation system for SPI, is an online system that can enable SPI officers to record crime information for easy update and retrieval.
ELECTRONIC CRIME DOCUMENTATION SYSTEM (A CASE STUDY OF SPI, AKWA IBOM STATE POLYTECHNIC)