0% found this document useful (0 votes)
39 views14 pages

Crime GIS Chapter 3

Uploaded by

paschal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views14 pages

Crime GIS Chapter 3

Uploaded by

paschal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

3.1 Methodology

Methodology is the underlying principles and rules that govern a system

method; on the other hand it is a systematic procedure for a set of activities.

Thus, from these definitions a methodology encompasses the methods used

within a study.

Structured Systems Analysis and Design Method (SSADM) is a systems

approach to the analysis and design of information systems. Structured

System Analysis and Design Method (SSADM) is a waterfall method by

which an Information System design can be arrived at. Structured System

Analysis and Design Method (SSADM) can be thought to represent a

pinnacle of the rigorous document-led approach to system design, and

contrasts with more contemporary Rapid Application Development methods

such as DSDM.

System design methods are a discipline within the software development

industry which seek to provide a framework for activity and the capture,

storage, transformation and dissemination of information so as to enable the

economic development of computer systems that are fit for purpose.


3.2 Analysis of the Existing System

One can categorise crimes depending on the related punishment, with

sentencing tariffs prescribed in line with the perceived seriousness of the offence.

Thus fines and noncustodial sentences may address the crimes seen as least

serious, with lengthy imprisonment or (in some jurisdictions) capital punishment

reserved for the most serious.

The following classes of offences are used, or have been used, as legal terms of

art:

i. Offence against the person

ii. Violent offence

iii. Sexual offence

iv. Offence against property

Researchers and commentators have classified crimes into the following

categories, in addition to those above:

i. Forgery, impersonation and cheating

ii. Firearms and offensive weapons

iii. Offences against the State/Offences against the Crown

and Government Political offences

iv. Harmful or dangerous drugs


v. Offences against religion and public worship

vi. Offences against public justice Offences against the administration

of public justice

vii. Public order offence

viii. Commerce, financial markets and insolvency

ix. Offences against public morals and public policy

x. Motor vehicle offences

xi. Conspiracy, incitement and attempt to commit crime

xii. Inchoate offence

xiii. Juvenile Delinquency

With the case of those involving crime the suspect will be arrested and

detained. The suspect will be given a suspect form under investigation to fill

in which the suspect data will be captured and the suspect will write

statement. All these data will be written in the record book and kept in the

archives. The suspect will be detained in the counter or cell as the case may

be, while the divisional crime officer assigns an investigating police officer

(IPO) the investigation to be conducted. Bailing as the case may be, maybe

granted to the suspect depending on the seriousness of the case. If bail is

granted the suspect will be expected to report to the police station on a daily

bases whenever needed. When the investigation has been concluded, the

details of the investigation will be documented on the crime diary booklet


by the investigating police officer, and then the suspect will be charged and

arrayed in the court where the judge will hear and give the final verdict.

The suspect or accused will be referred to as a criminal if after the court

hearing the suspect is found guilty.

3.2.1 Reference to Written Text

Reference was also made to some existing documents and case files in the

police station. Some materials were also downloaded from internet for the

purpose of reviewing the work.

3.3 Method Of Data Collection

3.3.1 Interview Method

This was done between the researcher and some of the officers of the

Nigerian Police in Rivers State. Information on criminal charges and trial

was gathered.

3.4 Input, Process and Output Analysis

3.4.1 Inputs Analysis

The various system inputs include the following input systems.

i. Witness /Suspect Statement

ii. Case File


This is used to capture suspect statement. Immediately a criminal is

convicted, a case file is open for the criminal. It contains the brief fact of

criminal matters.

3.4.2 Process Analysis

The crime information collected is stored in a database for future retrieval.

Also some processing is carried out on the case file to determine the

frequency of the occurrence of a particular crime.

3.4.3 Output Analysis

This is an output form hardcopy of the particulars of conviction. This is

generated after court has decided criminal matter and it is usually kept at the

police station.
3.5 Information Flow Diagram

Assistant commission of police

21/c second in charge

Superior police officers e.g. Assistant


superintendent of police

Sectional Sectional Sectional Sectional


Police Heads Police Heads Police Heads Police Heads

Teams of Teams of Teams of Teams of


IPOs IPOs IPOs IPOs

Fig 3.1:1 Information Flow Diagram

3.6 Problems of the Present System

Due to the manual means being used by the Nigerian police force, in

keeping information about crime and entering records of it into record books

instead of it being in form of data input into computer storage system, problems

arise and there problems have plagued the Nigerian police force and affected the

policing system in the country. Some of these problems are enumerated below.
a) Insufficient Equipment

Almost all police units in the country especially the Rivers state police lack

equipment such as computer system. If these systems are provided, there

will be good report generated, communication links among different police

units (when networked) and this in-turn will enhance decision Making and

ultimately facilitate the fighting of crime because good and valuable

information yield’s good results.

(b) Keeping Of Record Books For Different Cases That Come In Daily.

This presents a lot of problems to the policing system because the record

books are always voluminous and in trying to keep all these, some vital

information might be lost. This also makes the office look very clumsy and

untidy since most files are covered with dust.

(c) Loss Of Important Information

Due to damages that occur on record books and files, when pages are lost,

some vital information is also lost

(d) Inaccuracy –Due to the manual method of handling information a

lot of human error are noticed in processed information.

(e) Time lapses

Due to the manual method, there is always a slow response- time when the

law court requires information about particular cases.


(f) Insecurity

There can be no proper security of information.

3.7 Justification for the New System

The new system will help sanities crime tracking system in Nigeria. The

software will be of immense benefit to government. The software will

among other things:

1. Facilitate crime tracking system

2. Information management

3. Trial

4. Fast retrieval of documents


3.8.1 Output Specification And Design

The output form is designed to generate printable reports from the database. The

output is placed on a database grid and contains crime information. The output

produced can be printed on a hard copy or viewed on the screen. The output

generated includes:

1. Crime Report

2. Female Crime Report

3. Male Crime Report

4. Crime Report by Date

5. Crime Report By Crime Nature

3.8.2 Database File Design

In any good database design, effort should be made to remove completely or

at worst reduce redundancy. The database design in the software is

achieved using Microsoft access database. Bellow is the structure of the file

designed in the database.


3.8.3 Criminal File

Field Name Data Type Field Size


Case No Text 50
Name Text 50
Crime Text 50
Address Text 50
State of origin Text 25
LGA Text 25
Sex Text 6
Age Integer 4
IPO Text 50
Town Text 40
Court Text 100
Verdict Text 100
Cell No Double 8
Arrest date Date/Time 8
Date Convicted Date/Time 8

Fig 3.3:1 Criminal File.


3.9 Procedure Chart

Main Menu

File Case Report Query Help Exit

Search

Crime Daily Crime


Case Report
File Report

Update Crime statistics


Male report
Delete Cases
Case Report

Female
Cases

Fig 3.5 Procedure chart.


3.10 System Flowcharts

Input data

Input From
the
Keyboard Report

CPU

Disk
Output
Storage

Fig 4.5: System flowcharts.

3.11 System Requirements

In order to realize this project, the following software and hardware

components were used:

3.11.1 Hardware Requirements

In the cost of the design, the software developed needed the following

hardware for an effective and efficient operation of the new system.

1. Pentium IV
2. 1GB RAM.
3. Enhanced keyboard.

4. At least 40GB hard disk.

5. E.G.A/V.G.A, a coloured monitor.

6. An uninterruptible power supply (UPS) units

7. LaserJet or DeskJet printer.

3.11.2 Software Requirements

The software requirements includes:-

 A window 10 or higher version for faster processing

 MySQL

 PHP

3.12 Programming Language Used

The new system is implemented using Microsoft PHP programming

language. This is because the programming language has the advantage of

easy development. Flexibility and it has the ability of providing the

developer/programmer with possible hints and it produces a graphical user

interface.
3.13 Program Flowcharts

Start

Main Menu
1. Case File
Query
2.
Report
3. Menu
Select Exit
option

Yes
Option 1 ? Call Case form

No

Yes
Option 2 ? Call query program

No

Yes
Option 3 ? Call Report Module

No

No
Option 4 ?

Yes

Stop

You might also like