The world over, it is
indisputable that the introduction of computer technology in different aspect
of life, has virtually transformed and entranced information processing, which
is very vital in any organization of government. Not only as a means of information
processing, has the technology also proved to be the fastest means of
information retrieval, which forms the nucleus of this study. This work tries
to x- ray the rate role of the computer in crime investigation as it affects
the state security service (SSS) in Nigeria.
Force looks at ways of improving the information management of the
force. This research will cover the
following areas: record information retrieval relating to MIS (Management
information system), retirement Cretan for officers and crime mapping through a
data bank of crime related information. A detailed design of a computerized
approach that will bring the much needed innovation is given. Also included in this work is a proper
documentation for the new system design.
ABSTRACT text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">4
CHAPTER ONE text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">5
mso-no-proof:yes">INTRODUCTION none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">.. text-decoration:none;text-underline:none">5
mso-no-proof:yes">1.1 text-decoration:none;text-underline:none"> BACKGROUND OF
THE STUDY mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">5
mso-no-proof:yes">1.2 STATEMENT OF THE PROBLEM display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">... text-decoration:none;text-underline:none">6
mso-no-proof:yes">1.3 OBJECTIVES OF THE STUDY display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">.. text-decoration:none;text-underline:none">7
mso-no-proof:yes">`1.4 PURPOSE OF THE STUDY display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">.. text-decoration:none;text-underline:none">7
mso-no-proof:yes">1.5 text-decoration:none;text-underline:none"> SIGNIFICANCE OF
THE STUDY mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">8
mso-no-proof:yes">1.6 text-decoration:none;text-underline:none"> SCOPE OF THE
STUDY mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">8
mso-no-proof:yes">1.7 text-decoration:none;text-underline:none"> LIMITATION text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">8
mso-no-proof:yes">1.8 text-decoration:none;text-underline:none"> DEFINITION OF
TERMS mso-no-proof:yes;text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">9
CHAPTER TWO text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">11
mso-no-proof:yes">LITERATURE REVIEW display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">... text-decoration:none;text-underline:none">11
mso-no-proof:yes">2.1. text-decoration:none;text-underline:none"> OVERVIEW text-decoration:none;text-underline:none">... text-decoration:none;text-underline:none">11
mso-no-proof:yes">2.2 ORIGIN OF STATE
SECURITY SERVICE (SSS) mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">11
mso-no-proof:yes">2.3 MANDATE OF
STATE SECURITY SERVICE mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">12
mso-no-proof:yes">2.4 REVIEW OF
NATURAL-LAW THEORY mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">14
mso-no-proof:yes">2.5 TRACKING SYSTEM text-decoration:none;text-underline:none">... text-decoration:none;text-underline:none">14
mso-no-proof:yes">2.6 CONCLUSION display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">.. text-decoration:none;text-underline:none">15
mso-no-proof:yes">SYSTEM ANALYSIS display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">. text-decoration:none;text-underline:none">16
mso-no-proof:yes">3.1 METHODOLOGY display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">.. text-decoration:none;text-underline:none">16
mso-no-proof:yes">3.4 FUNCTIONAL
REQUIREMENTS mso-no-proof:yes;text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">17
mso-no-proof:yes">3.5 NON FUNCTIONAL REQUIREMENTS text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">18
CHAPTER FOUR text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">19
mso-no-proof:yes">SYSTEM DESIGN display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">.. text-decoration:none;text-underline:none">19
mso-no-proof:yes">4.1 OVERVIEW none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">... text-decoration:none;text-underline:none">19
mso-no-proof:yes">4.2 DESIGN GOAL: The main objective of these project are as
follows; mso-no-proof:yes;text-decoration:none;text-underline:none"> text-decoration:none;text-underline:none">19
mso-no-proof:yes">4.3 INTERFACE DESIGN display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">.. text-decoration:none;text-underline:none">19
mso-no-proof:yes">4.4 text-decoration:none;text-underline:none"> DATABASE TABLES text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">20
mso-no-proof:yes">4.6 SYSTEM FLOW
CHART mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">22
mso-no-proof:yes">4.7 PROGRAM DESIGN display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">.. text-decoration:none;text-underline:none">23
mso-no-proof:yes">4.8 PROGRAM FLOWCHART display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">.. text-decoration:none;text-underline:none">24
mso-no-proof:yes">4.9 PSEUDOCODE display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">.. text-decoration:none;text-underline:none">28
CHAPTER FIVE text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">31
mso-no-proof:yes">SYSTEM IMPLEMENTATION display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">.. text-decoration:none;text-underline:none">31
mso-no-proof:yes">5.1 CODING mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">31
mso-no-proof:yes">5.2 SYSTEM TESTING display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">.. text-decoration:none;text-underline:none">31
mso-no-proof:yes">5.3 text-decoration:none;text-underline:none"> DEBUGGING text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">32
TGLj2ly5c000ddfcb7f50.05228552, Q. (2018). DESIGN AND IMPLEMENTATION OF CRIME INFORMATION MANAGEMENT SYSTEM (CIMAS). Afribary. Retrieved from https://beta.afribary.com/works/design-and-implementation-of-crime-information-management-system-cimas-5270
TGLj2ly5c000ddfcb7f50.05228552, QJgJgJQ5c000ddfca2911.15570672 "DESIGN AND IMPLEMENTATION OF CRIME INFORMATION MANAGEMENT SYSTEM (CIMAS)" Afribary. Afribary, 29 Jan. 2018, https://beta.afribary.com/works/design-and-implementation-of-crime-information-management-system-cimas-5270. Accessed 24 Apr. 2025.
TGLj2ly5c000ddfcb7f50.05228552, QJgJgJQ5c000ddfca2911.15570672 . "DESIGN AND IMPLEMENTATION OF CRIME INFORMATION MANAGEMENT SYSTEM (CIMAS)". Afribary, Afribary, 29 Jan. 2018. Web. 24 Apr. 2025. < https://beta.afribary.com/works/design-and-implementation-of-crime-information-management-system-cimas-5270 >.
TGLj2ly5c000ddfcb7f50.05228552, QJgJgJQ5c000ddfca2911.15570672 . "DESIGN AND IMPLEMENTATION OF CRIME INFORMATION MANAGEMENT SYSTEM (CIMAS)" Afribary (2018). Accessed April 24, 2025. https://beta.afribary.com/works/design-and-implementation-of-crime-information-management-system-cimas-5270