DESIGN AND IMPLEMENTATION OF CRIME INFORMATION MANAGEMENT SYSTEM (CIMAS)

54 PAGES (9533 WORDS) Computer Science Project
ABSTRACT

The world over, it is
indisputable that the introduction of computer technology in different aspect
of life, has virtually transformed and entranced information processing, which
is very vital in any organization of government.  Not only as a means of information
processing, has the technology also proved to be the fastest means of
information retrieval, which forms the nucleus of this study. This work tries
to x- ray the rate role of the computer in crime investigation as it affects
the state security service (SSS) in Nigeria. 
Force looks at ways of improving the information management of the
force.  This research will cover the
following areas: record information retrieval relating to MIS (Management
information system), retirement Cretan for officers and crime mapping through a
data bank of crime related information. A detailed design of a computerized
approach that will bring the much needed innovation is given.  Also included in this work is a proper
documentation for the new system design.

mso-fareast-theme-font:major-fareast;color:windowtext;font-weight:normal;
mso-bidi-font-weight:bold" lang="EN-US">


TABLE OF CONTENT
mso-ascii-theme-font:minor-latin;mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;mso-hansi-font-family:Calibri;mso-hansi-theme-font:
minor-latin;mso-bidi-font-family:"Times New Roman";mso-bidi-theme-font:minor-bidi;
color:windowtext;font-weight:normal" lang="EN-US">

ABSTRACT text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">4


CHAPTER ONE text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">5


mso-no-proof:yes">INTRODUCTION none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">..
text-decoration:none;text-underline:none">5


mso-no-proof:yes">1.1 text-decoration:none;text-underline:none">        BACKGROUND OF
THE STUDY
mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">5


mso-no-proof:yes">1.2 STATEMENT OF THE PROBLEM display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">...
text-decoration:none;text-underline:none">6


mso-no-proof:yes">1.3 OBJECTIVES OF THE STUDY display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">..
text-decoration:none;text-underline:none">7


mso-no-proof:yes">`1.4 PURPOSE OF THE STUDY display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">..
text-decoration:none;text-underline:none">7


mso-no-proof:yes">1.5 text-decoration:none;text-underline:none">        SIGNIFICANCE OF
THE STUDY
mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">8


mso-no-proof:yes">1.6 text-decoration:none;text-underline:none">        SCOPE OF THE
STUDY
mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">8


mso-no-proof:yes">1.7 text-decoration:none;text-underline:none">        LIMITATION text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">8


mso-no-proof:yes">1.8 text-decoration:none;text-underline:none">        DEFINITION OF
TERMS
mso-no-proof:yes;text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">9


CHAPTER TWO text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">11


mso-no-proof:yes">LITERATURE REVIEW display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">...
text-decoration:none;text-underline:none">11


mso-no-proof:yes">2.1. text-decoration:none;text-underline:none">     OVERVIEW text-decoration:none;text-underline:none">... text-decoration:none;text-underline:none">11


mso-no-proof:yes">2.2   ORIGIN OF STATE
SECURITY SERVICE (SSS)
mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">11


mso-no-proof:yes">2.3    MANDATE OF
STATE SECURITY SERVICE
mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">12


mso-no-proof:yes">2.4    REVIEW OF
NATURAL-LAW THEORY
mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">14


mso-no-proof:yes">2.5   TRACKING SYSTEM text-decoration:none;text-underline:none">... text-decoration:none;text-underline:none">14


mso-no-proof:yes">2.6 CONCLUSION display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">..
text-decoration:none;text-underline:none">15


mso-no-proof:yes">SYSTEM ANALYSIS display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">.
text-decoration:none;text-underline:none">16


mso-no-proof:yes">3.1 METHODOLOGY display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">..
text-decoration:none;text-underline:none">16


mso-no-proof:yes">3.4   FUNCTIONAL
REQUIREMENTS
mso-no-proof:yes;text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">17


mso-no-proof:yes">3.5 NON FUNCTIONAL REQUIREMENTS text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">18


CHAPTER FOUR text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">19


mso-no-proof:yes">SYSTEM DESIGN display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">..
text-decoration:none;text-underline:none">19


mso-no-proof:yes">4.1 OVERVIEW none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">...
text-decoration:none;text-underline:none">19


mso-no-proof:yes">4.2 DESIGN GOAL: The main objective of these project are as
follows;
mso-no-proof:yes;text-decoration:none;text-underline:none"> text-decoration:none;text-underline:none">19


mso-no-proof:yes">4.3 INTERFACE DESIGN display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">..
text-decoration:none;text-underline:none">19


mso-no-proof:yes">4.4 text-decoration:none;text-underline:none">        DATABASE TABLES text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">20


mso-no-proof:yes">4.6      SYSTEM FLOW
CHART
mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">22


mso-no-proof:yes">4.7 PROGRAM DESIGN display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">..
text-decoration:none;text-underline:none">23


mso-no-proof:yes">4.8 PROGRAM FLOWCHART display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">..
text-decoration:none;text-underline:none">24


mso-no-proof:yes">4.9 PSEUDOCODE display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">..
text-decoration:none;text-underline:none">28


CHAPTER FIVE text-decoration:none;text-underline:none">. text-decoration:none;text-underline:none">31


mso-no-proof:yes">SYSTEM IMPLEMENTATION display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">..
text-decoration:none;text-underline:none">31


mso-no-proof:yes">5.1 CODING mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">31


mso-no-proof:yes">5.2 SYSTEM TESTING display:none;mso-hide:screen;mso-no-proof:yes;text-decoration:none;text-underline:
none">..
text-decoration:none;text-underline:none">31


mso-no-proof:yes">5.3 text-decoration:none;text-underline:none">        DEBUGGING text-decoration:none;text-underline:none">.. text-decoration:none;text-underline:none">32