CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
       3.1    Methodology
Methodology is the underlying principles and rules that govern a system
method; on the other hand it is a systematic procedure for a set of activities.
Thus, from these definitions a methodology encompasses the methods used
within a study.
Structured Systems Analysis and Design Method (SSADM) is a systems
approach to the analysis and design of information systems. Structured
System Analysis and Design Method (SSADM) is a waterfall method by
which an Information System design can be arrived at. Structured System
Analysis and Design Method (SSADM) can be thought to represent a
pinnacle of the rigorous document-led approach to system design, and
contrasts with more contemporary Rapid Application Development methods
such as DSDM.
System design methods are a discipline within the software development
industry which seek to provide a framework for activity and the capture,
storage, transformation and dissemination of information so as to enable the
economic development of computer systems that are fit for purpose.
              3.2   Analysis of the Existing System
       One can categorise crimes depending on the related punishment, with
sentencing tariffs prescribed in line with the perceived seriousness of the offence.
Thus fines and noncustodial sentences may address the crimes seen as least
serious, with lengthy imprisonment or (in some jurisdictions) capital punishment
reserved for the most serious.
The following classes of offences are used, or have been used, as legal terms of
art:
          i. Offence against the person
          ii. Violent offence
         iii. Sexual offence
         iv. Offence against property
       Researchers and commentators have classified crimes into the following
       categories, in addition to those above:
          i. Forgery, impersonation and cheating
          ii. Firearms and offensive weapons
         iii. Offences against the State/Offences against the Crown
                         and Government Political offences
         iv. Harmful or dangerous drugs
   v. Offences against religion and public worship
  vi. Offences against public justice Offences against the administration
      of public justice
  vii. Public order offence
 viii. Commerce, financial markets and insolvency
  ix. Offences against public morals and public policy
   x. Motor vehicle offences
  xi. Conspiracy, incitement and attempt to commit crime
  xii. Inchoate offence
 xiii. Juvenile Delinquency
With the case of those involving crime the suspect will be arrested and
detained. The suspect will be given a suspect form under investigation to fill
in which the suspect data will be captured and the suspect will write
statement. All these data will be written in the record book and kept in the
archives. The suspect will be detained in the counter or cell as the case may
be, while the divisional crime officer assigns an investigating police officer
(IPO) the investigation to be conducted. Bailing as the case may be, maybe
granted to the suspect depending on the seriousness of the case. If bail is
granted the suspect will be expected to report to the police station on a daily
bases whenever needed. When the investigation has been concluded, the
details of the investigation will be documented on the crime diary booklet
by the investigating police officer, and then the suspect will be charged and
arrayed in the court where the judge will hear and give the final verdict.
The suspect or accused will be referred to as a criminal if after the court
hearing the suspect is found guilty.
3.2.1 Reference to Written Text
Reference was also made to some existing documents and case files in the
police station. Some materials were also downloaded from internet for the
purpose of reviewing the work.
         3.3   Method Of Data Collection
3.3.1 Interview Method
This was done between the researcher and some of the officers of the
Nigerian Police in Rivers State. Information on criminal charges and trial
was gathered.
         3.4   Input, Process and Output Analysis
3.4.1 Inputs Analysis
The various system inputs include the following input systems.
   i.      Witness /Suspect Statement
   ii.     Case File
This is used to capture suspect statement. Immediately a criminal is
convicted, a case file is open for the criminal. It contains the brief fact of
criminal matters.
3.4.2 Process Analysis
The crime information collected is stored in a database for future retrieval.
Also some processing is carried out on the case file to determine the
frequency of the occurrence of a particular crime.
3.4.3 Output Analysis
This is an output form hardcopy of the particulars of conviction. This is
generated after court has decided criminal matter and it is usually kept at the
police station.
               3.5   Information Flow Diagram
                     Assistant commission of police
                          21/c second in charge
               Superior police officers       e.g.    Assistant
               superintendent of police
 Sectional             Sectional          Sectional            Sectional
Police Heads          Police Heads       Police Heads         Police Heads
 Teams of             Teams of           Teams of            Teams of
   IPOs                 IPOs               IPOs                IPOs
      Fig 3.1:1 Information Flow Diagram
               3.6   Problems of the Present System
      Due to the manual means being used by the Nigerian police force, in
keeping information about crime and entering records of it into record books
instead of it being in form of data input into computer storage system, problems
arise and there problems have plagued the Nigerian police force and affected the
policing system in the country. Some of these problems are enumerated below.
a)    Insufficient Equipment
Almost all police units in the country especially the Rivers state police lack
equipment such as computer system. If these systems are provided, there
will be good report generated, communication links among different police
units (when networked) and this in-turn will enhance decision Making and
ultimately facilitate the fighting of crime because good and valuable
information yield’s good results.
(b)   Keeping Of Record Books For Different Cases That Come In Daily.
This presents a lot of problems to the policing system because the record
books are always voluminous and in trying to keep all these, some vital
information might be lost. This also makes the office look very clumsy and
untidy since most files are covered with dust.
(c)   Loss Of Important Information
Due to damages that occur on record books and files, when pages are lost,
some vital information is also lost
(d)   Inaccuracy –Due to the manual method of handling information a
lot of human error are noticed in processed information.
(e)   Time lapses
Due to the manual method, there is always a slow response- time when the
law court requires information about particular cases.
    (f)        Insecurity
               There can be no proper security of information.
3.7 Justification for the New System
    The new system will help sanities crime tracking system in Nigeria. The
    software will be of immense benefit to government. The software will
    among other things:
          1.      Facilitate crime tracking system
          2.      Information management
          3.      Trial
          4.      Fast retrieval of documents
3.8.1 Output Specification And Design
The output form is designed to generate printable reports from the database. The
output is placed on a database grid and contains crime information. The output
produced can be printed on a hard copy or viewed on the screen. The output
generated includes:
         1.     Crime Report
         2.     Female Crime Report
         3.     Male Crime Report
         4.     Crime Report by Date
         5.     Crime Report By Crime Nature
     3.8.2    Database File Design
      In any good database design, effort should be made to remove completely or
      at worst reduce redundancy. The database design in the software is
      achieved using Microsoft access database. Bellow is the structure of the file
      designed in the database.
3.8.3           Criminal File
        Field Name                 Data Type   Field Size
        Case No                    Text        50
        Name                       Text        50
        Crime                      Text        50
        Address                    Text        50
        State of origin            Text        25
        LGA                        Text        25
        Sex                        Text        6
        Age                        Integer     4
        IPO                        Text        50
        Town                       Text        40
        Court                      Text        100
        Verdict                    Text        100
        Cell No                    Double      8
        Arrest date                Date/Time   8
        Date Convicted             Date/Time   8
        Fig 3.3:1 Criminal File.
    3.9     Procedure Chart
                                 Main Menu
File Case                        Report            Query    Help              Exit
              Search
                                          Crime            Daily Crime
                        Case                               Report
                        File              Report
                        Update                             Crime statistics
                                          Male             report
                        Delete            Cases
                                                           Case Report
                                          Female
                                          Cases
                 Fig 3.5 Procedure chart.
         3.10 System Flowcharts
                                                    Input data
                              Input From
                                  the
                               Keyboard                          Report
                                            CPU
                   Disk
                                                                 Output
                   Storage
              Fig 4.5: System flowcharts.
         3.11 System Requirements
              In order to realize this project, the following software and hardware
              components were used:
3.11.1                Hardware Requirements
              In the cost of the design, the software developed needed the following
              hardware for an effective and efficient operation of the new system.
              1.      Pentium IV
              2.       1GB RAM.
              3.       Enhanced keyboard.
              4.       At least 40GB hard disk.
              5.       E.G.A/V.G.A, a coloured monitor.
              6.       An uninterruptible power supply (UPS) units
              7.       LaserJet or DeskJet printer.
3.11.2                 Software Requirements
                       The software requirements includes:-
                    A window 10 or higher version for faster processing
                    MySQL
                      PHP
         3.12 Programming Language Used
              The new system is implemented using Microsoft PHP programming
              language. This is because the programming language has the advantage of
              easy development. Flexibility and it has the ability of providing the
              developer/programmer with possible hints and it produces a graphical user
              interface.
3.13 Program Flowcharts
                   Start
         Main Menu
             1.    Case File
                   Query
             2.
                   Report
             3. Menu
         Select    Exit
         option
                               Yes
            Option 1 ?                     Call Case form
                         No
                                     Yes
            Option 2 ?                        Call query program
                         No
                                     Yes
            Option 3 ?                        Call Report Module
                         No
                                     No
            Option 4 ?
                         Yes
                Stop