DESIGN AND IMPLEMENTATION OF CRIME INFORMATION MANAGEMENT SYSTEM (CIMAS)

37 PAGES (9241 WORDS) Computer Science Project

ABSTRACT

The world over, it is
indisputable that the introduction of computer technology in different aspect
of life, has virtually transformed and entranced information processing, which
is very vital in any organization of government.  Not only as a means of information
processing, has the technology also proved to be the fastest means of
information retrieval, which forms the nucleus of this study. This work tries
to x- ray the rate role of the computer in crime investigation as it affects
the state security service (SSS) in Nigeria. 
Force looks at ways of improving the information management of the
force.  This research will cover the
following areas: record information retrieval relating to MIS (Management
information system), retirement Cretan for officers and crime mapping through a
data bank of crime related information. A detailed design of a computerized
approach that will bring the much needed innovation is given.  Also included in this work is a proper
documentation for the new system design.




TABLE OF CONTENT

ABSTRACT. 4


CHAPTER ONE. 5


INTRODUCTION.. 5


1.1        BACKGROUND OF
THE STUDY
.. 5


1.2 STATEMENT OF THE PROBLEM... 6


1.3 OBJECTIVES OF THE STUDY.. 7


`1.4 PURPOSE OF THE STUDY.. 7


1.5        SIGNIFICANCE OF
THE STUDY
.. 8


1.6        SCOPE OF THE
STUDY
.. 8


1.7        LIMITATION.. 8


1.8        DEFINITION OF
TERMS
. 9


CHAPTER TWO.. 11


LITERATURE REVIEW... 11


2.1.      OVERVIEW... 11


2.2   ORIGIN OF STATE
SECURITY SERVICE (SSS)
. 11


2.3    MANDATE OF
STATE SECURITY SERVICE
.. 12


2.4    REVIEW OF
NATURAL-LAW THEORY
.. 14


2.5   TRACKING SYSTEM... 14


2.6 CONCLUSION.. 15


SYSTEM ANALYSIS. 16


3.1 METHODOLOGY.. 16


3.4   FUNCTIONAL
REQUIREMENTS
. 17


3.5 NON FUNCTIONAL REQUIREMENTS. 18


CHAPTER FOUR. 19


SYSTEM DESIGN.. 19


4.1 OVERVIEW... 19


4.2 DESIGN GOAL: The main objective of these project are as
follows;
19


4.3 INTERFACE DESIGN.. 19


4.4        DATABASE TABLES. 20


4.6      SYSTEM FLOW
CHART
.. 22


4.7 PROGRAM DESIGN.. 23


4.8 PROGRAM FLOWCHART.. 24


4.9 PSEUDOCODE.. 28


CHAPTER FIVE. 31


SYSTEM IMPLEMENTATION.. 31


5.1 CODING.. 31


5.2 SYSTEM TESTING.. 31


5.3        DEBUGGING.. 32