CHAPTER TWO
LITERATURE REVIEW
 In this section, we analyze systems that are akin to the proposed system. We will focus on
 the systems that are closest in functionality to the CRMS, highlighting their key features,
 similarities, history, relationship b/w crime and police, advantages and disadvantages and
 existing system.
2.0 INTRODUCTION
 Crimes are a typical social issue influencing the personal satisfaction and the monetary
 development of a general public. In spite of the fact that wrongdoings could happen all
 over, usually offenders chip away at wrongdoing openings they face in most natural regions
 for them, by giving an information mining way to deal with decide the most criminal
 hotspots and discover the sort, area and time of perpetrated violations, we want to raise
 individuals' mindfulness in regards to the perilous areas in certain timespans (Almanie et
 al., 2015).
 Crime Report It can likewise be characterized as the correspondence of data orchestrated
 in an exact, succinct, clear and complete way, which at that point turns into a record of an
 offered episode to an invested individual for choice to be made. There are numerous sorts
 of wrongdoings, lawbreakers and unfortunate casualties. There are not kidding
 wrongdoings and little offenses (Jakkhupan, et al., 2014).
 Crime Reporting System will address the refered to explanations behind not announcing,
 yet in addition the need of police offices for progressively precise, complete, and reusable
 data that may save their time and assets to designate them to policing the roads An online
 arrangement is valuable as the arrangement is innately distributive. This distributive normal
for the online arrangement helps in getting the diverse police headquarters to share data
and get in contact with each other. It likewise enhances work proficiency of the office.
Utilizing this application data dealing with will be simple and quick and illuminating cases
will be quick (Jaiswal, et al., 2013).
Crime Report System is a system used to report crimes. It very well may be utilized to
report Crime. This venture is primarily valuable for police headquarters. This framework
will deal with every one of the exercises in a police headquarters utilizing PCs. As of now,
every one of the works are done physically, by mechanizing every one of the exercises
inside a police headquarters can be overseen effectively and successfully, This framework
will deal with every one of the exercises in a police headquarters utilizing PCs, It is a critical
thinking movement that requires concentrated correspondence between the framework
clients and framework engineers. The goals of this application is to keep up a mechanized
record of all the F.I.R against wrongdoing (Jain, et al., 2017).
Many researchers trust that revealed wrongdoing information are defiled by estimation
mistake emerging from contrasts in police division detailing rehearses crosswise over
locales, innovative advances in wrongdoing recording, and changes in wrongdoing
announcing by exploited people after some time. Regardless of whether such issues exist,
be that as it may, they don't really block the utilization of revealed wrongdoing
measurements for deciding the adequacy of strategies intended to diminish wrongdoing
(Levitt, et al. 1998).
Lately police powers have been improving their conventional strategy for wrongdoing
revealing with new mechanical progressions to build their yield by effectively recording
violations to help their examination (Adderley and Musgrove 1999). Information isn't only
a record of wrongdoings, and it likewise contains important data that could be utilized to
 connect wrongdoing scenes dependent on the usual way of doing things (MO) of the
 offender(s), recommend which guilty parties might be in charge of the wrongdoing and
 furthermore distinguish those wrongdoers who work in groups (guilty party systems) and
 so forth. In this day and age, PCs are assuming a noteworthy job in the examination of a
 wide range of wrongdoing from those that are considered as volume wrongdoing (thievery,
 vehicle wrongdoing and so on.) to significant wrongdoing, for example, misrepresentation,
 medicate dealing, murder, and so on.( Grover, et al. 2007).
2.1 HISTORY OF CRIME REPORTING
 The role of computers has been increased in all walks of life from the finance sector to
 supermarkets. In recent years police forces have been enhancing their traditional method
 of crime reporting with new technological advancements to increase their output by
 efficiently recording crimes to aid their investigation (Adderley and Musgrove 1999), Data
 is not just a record of crimes, it also contains valuable information that could be used to
 link crime scenes based on the modus operandi (MO) of the offender(s), suggest which
 offenders may be responsible for the crime and also identify those offenders who work in
 teams (offender networks) etc, In today’s world, computers are playing a major role in the
 investigation of all types of crime from those that are considered as volume crime (burglary,
 vehicle crime, etc.) to major crime such as fraud, drug trafficking, murder etc., It is not an
 easy task for a Police analyst to manually unravel the inherent complexities within police
 data and this problem is compounded when the analysis is undertaken by a team. The
 distribution of the data to the team may cause significant information, which could be
 useful to solve the crimes, to be missed as each member is not in possession of all relevant
 facts. For a long time, criminologists and statisticians have been applying their skills and
 knowledge trying to predict when and where the next set of crimes will occur, with varying
degrees of success. The volume of crime and the greater awareness of modern criminals
put a strain on the existing methods. Human reasoning fails when presented with millions
of records. Therefore, there is clearly a requirement for a tool kit to assist in analyzing the
data which will make the best use of limited resources. (Grover, et al., 2007).
Crime is one of the human security problems confronting humanity across the world.
Nations have grappled to contain the rising incidence of homicide, armed robbery, and
kidnap, drug trafficking, sex trafficking, illegal gun running and host of others, United
Nations Office on Drugs and Crime in 2011 reported that homicides globally were
estimated at 468,000 and more than a third (36%) was estimated to have occurred in Africa,
31% in The Americas, 27% in Asia, 5% in Europe and 1% in the tropical Pacific region 3,
Africa has been on the forefront on global statistics on crime. South Africa and Nigeria
have recorded high incidents of violent and non-violent crimes in recent times. According
to Africa Check, that incidents of murder increased from 15 609 murders in 2011/12 to 16
259 murders in 2012/13 in South Africa, with increase of 650 murder cases or a 4,2%
increase when comparing the total numbers of murders with the previous years5. According
to the same report, murders and attempted murders that take place during aggravated
robbery or inter-group conflict (such as gang or taxi violence), and vigilantism make up
between 35% and 45% of all murders and attempted murders 6. (Osawe, et al., 2015).
Between 1971 and 1975, the United States Department of Justice conducted victimization
surveys in 26 large American cities. Approximately 10,000 household interviews were
conducted in each city. Information was collected on victimization and reporting for a
variety of crimes and is collected in the United States Department of Justice (1975 a, b,
1976) reports. The strength of these data is the availability of city identifiers that can be
linked to the police staffing data collected annually in the FBI's Uniform Crime Reports.
(Levitt, 1998).
The concept of Crime can be viewed as an: illegal act (an action prohibited by Law or
failure to act as required by law); illegal activity that involves breaking the Law; immoral
activity that is considered unacceptable act that is shameful, unwise or regrettable. Crime
by the Law of the Federal republic of Nigeria (FRN, 1999) is defined as „An act or omission
which renders the person doing the act or making the omission liable to punishment under
the criminal code, or any Act or Law” Crime is brought about by the violation of the Law
as established by the government at all levels, Crime is an infraction of both the basic
principles of law and order and the norms of civilized behavior, Crime is an offence against
the value system of a society. The cost and effects of crime vary among the various
segments of the population and touch almost everyone by some degree and in general as
the economic growth and development of countries increase, it would be expected that
crime level reduces, this may not necessarily be. The various cost of crime to victims and
the society or the economy include; loss of income, property losses, loss in community
productivity, etc. Some other cost of crime, which are less tangible; include psychological
trauma on victims and their family and friends, pain and suffering and a lower quality of
life. In all of these and other associated losses, the ultimate cost is loss of life (Osawe, et
al., 2015).
Deterrence Theory and Crime Schelling developed deterrence theory in 1966 as a
preventative military strategy during the Cold War (Paternoster, 2011). The emphasis of
deterrence theory is that punishment serves as a way to minimize and prevent criminal
behaviors (Ritchey & Nicholson-Crotty, 2011; Rizzolli & Stanca, 2012). Deterrence
operates in two ways (a) specifics and (b) generals (Paternoster, 2010; Piquero, Paternoster,
 Pograsky, & Loughran, 2011). Specific deterrence pertains to deterring an individual from
 committing another crime, whereas general deterrence pertains to punishing an individual
 as an example to the general population (Kabia 2016).
 Montaldo (2013) said that crime occurs when someone breaks the law by an overt act,
 omission or neglect that can result in punishment. A person who has violated a law, or has
 breached a rule, is said to have committed a criminal offense. According to National Crime
 Prevention Strategy (1996), Crime results in the deprivation of the rights and dignity of
 citizens, and poses a threat to peaceful resolution of differences and rightful participation
 of all in the democratic process. It inhibits our citizens from communicating with one
 another freely, from engaging in economic activity and prevents entrepreneurs and
 investors from taking advantage of the opportunities, which our country offers.
 Government regards the prevention of crime as a national priority. (Ugwuishiwu, et al.,
 2013).
2.2 RELATIONSHIP BETWEEN POLICE AND CRIME
The measure of the police force systematically influences the willingness of exploited people
to report wrongdoing or a police division's affinity authoritatively to record injured individual
wrongdoing reports, at that point UCR information will downplay the genuine adequacy of
police in decreasing wrongdoing. Exploited people might be bound to report violations to the
police when the apparent probability of a wrongdoing being understood is high. Moreover,
the prepared accessibility of a cop at the scene of a wrongdoing may likewise prompt more
wrongdoing reports, and it is anything but difficult to envision that increments in police labor
will influence the probability that native grumblings are authoritatively recorded by police
divisions. On the off chance that detailing/recording inclination (from now on alluded to as
"revealing" predisposition for quickness) is available, announced wrongdoing rates may
increment with the extent of the police constrain, regardless of whether the genuine
exploitation rate is falling. The way that considerably not exactly 50% of all wrongdoings
secured by the FBI's Uniform Crime Reports are really answered to the police uplifts worry
over the significance of announcing inclination. Announcing inclination is often refered to
as a clarification for the inability to reveal a connection between detailed wrongdoings and
police nearness e.g., Greenwood and Wadycki, 1973; Swimmer, 1974; Thaler, 1977, 1978;
CarrHill and Stern, 1979; Cameron, 1988; Devine et al., 1988. (Levitt 1998).
Police Information Management System (PIMS) is a disconnected undertaking that enables
clients to store police office's case subtleties, Complaint Details, First Information Report
(FIR) Details, and so forth. This Software Package permits Police Departments to store every
one of the subtleties identified with the office and use them at whatever point fundamental.
The task reports different cases, FIR report, charge sheet report, Most Wanted Criminals
record, finance, participation reports and furthermore can transfer and view criminal
photographs and filtered archives. The prerequisites for this framework was gathered from
Manglaore Police Station (Ugwuishiwu, et al., 2013).
The center mission of the police is to control wrongdoing. Nobody question this. To be sure,
proficient wrongdoing battling appreciates wide open help as the essential system of policing
definitely in light of the fact that it epitomizes a profound promise to this goal. Interestingly,
other proposed methodologies, for example, critical thinking or network policing show up
superficially to obscure this center.' If these techniques were to leave the network
increasingly helpless against criminal exploitation, they would be unwanted options. In
making a decision about the estimation of elective police systems in controlling wrongdoing,
in hunting down approaches to avoid or control genuine wrongdoing, the police search for
hastening causes. While it might be helpful to analyze what some call the underlying drivers
of wrongdoing (e.g., social unfairness, unequal financial chance, poor tutoring, frail family
structures, or dysfunctional behavior), such things are moderately irrelevant from a police
viewpoint since the police practice little impact over them. The police work on the outside
of public activity. They should deal with episodes, circumstances, and individuals as they are
presently not social orders or individuals as they may have been. Hence, the promptly
hastening reasons for genuine wrongdoing are definitely more vital to the police than are
more extensive inquiries regarding the main drivers of wrongdoing. (Moore, et al., 1998).
2.3 WHAT IS A CRIME?
Crime is a geological. It happens at a particular spot, explicit time and for a particular reason.
It can influence everybody and anybody whenever. Wrongdoings are intricate and
continually evolving. Social and mechanical changes presented new targets, apparatuses and
thought processes in wrongdoing. This online web application for keeping up the best
possible everyday citizens grievances for the police office by utilizing this application
individuals, who are apprehensive or don't have enough time to go the police headquarters
for griping about their own legitimate issues here they can give their protest through online
to record any kind of grumbling. It comprises of grumbling box where the general population
can enroll their grievances. Here clients will have the mindfulness about laws and the
particular disciplines for the wrongdoing (Awodele, et al., 2015).
2.3.1 Crime Management
The event of wrongdoing isn't irregular. It is spatially conveyed in examples a few examples
are found while others are most certainly not. Factor, for example, social class, salary level
and the condition plays parts in the sorts of wrongdoing that are submitted. Assets and
additionally an absence of assets can impact the likelihood of wrongdoings submitted in some
random region. As a result of the intricacy of wrongdoing, wrongdoing must be overseen.
Wrongdoing as different definitions relying upon which viewpoint one is taking a gander at
it from. For this exploration wrongdoing is characterized as "infringement of law or an
occasion of this, deserving of the state." Management, then again, is the way toward
coordinating and controlling the assets of an association such As its staff, materials, and
hardware to accomplish the objectives of the association. Wrongdoing the board is thusly
characterized as controlling, coordinating, and organizing police assets (cash, gear, and
faculty) to keep the infringement of law and where it has been damaged, to secure the culprits
and indict them (Jimoh, R. G. et al, 2014).
2.3.2 Crime Reporting
The past discoveries are enough to persuade readers regarding the significance that
detailing conduct has for the criminal equity framework and the network. Residents,
through the detailing of their wrongdoing encounters begin the criminal equity hardware
which thusly empowers examination of violations by police, the arraignment and
preliminary of guilty parties, and their discipline. The deterrent impact of criminal equity is
potentiated too, then again, non-announcing blocks access to remuneration plans, guilty
parties not being captured, and the objective of an increasingly evenhanded criminal equity
framework being accomplished. Be that as it may, not all the exploitation occurrences are
wrongdoings in a specialized sense, and of those which are, some are minor for sure, the
police will total criminal offense reports in just few these episodes. Expanded readiness to
report what individuals see as violations would result in expanded police endeavors in
managing minor episodes, not all of which may result in attractive results to the people in
question; an issue with possibly pessimistic ramifications for the detailing of maybe
progressively genuine future occurrences. Wrongdoing exploitation is an outflow of social
clash, detailing of apparent exploitation encounters to the police relies on a perplexing
arrangement of variables going from earnestness of episodes to trust in the criminal equity
framework, A progressively total comprehension of non-announcing, its dispersion and its
associates will enable us to evaluate the execution of our criminal equity offices.
2.3.3 Reporting Methods
Effective methods of anonymous reporting include:
• The tip box
• The telephone coupled with an answering machine or voice mail
• E-mail to a central address
• A web site that directs reports to a central address
• Oral reports
The tip box usually consists of several locked boxes at key points around the school or
neighborhood. Each box has a slot for inserting written reports. Boxes need to be located in
Places that are reasonably populated - not deserted and not in the middle of heavy traffic.
The box (and education about using it) should remind students and citizens of what's needed
For a good report - a dated, legible note describing as much as possible what happened where,
when, how and by whom. Advantages of the tip box include low cost, low reliance of
technology and written records. Disadvantages include unreadable reports and limited access.
Tip boxes also require that someone physically visit and collect reports from each of
The boxes.
Telephone reporting systems offer a number of variations.
Some include a toll-free line directed to a cell phone. Some reporting lines are partnered with
a hotline. Calls left on a voicemail or answering machine can be retrieved from anywhere.
The report taker doesn't have to visit boxes. The telephone approach allows students to call
from school, from home, from a friend or from a pay phone. People tend to be comfortable
talking on the phone, so this approach leaves no lasting record of the report, unless messages
taped or transcribed and checked for accuracy. It also requires resources - funds or in-kind
donations for the equipment, the telephone service, and a secure area in which to house the
Equipment.
E-mail and web sites have proved successful in reaching out to those who are electronically
literate. Some systems have both an e-mail box and a web site for crime reports. Both email
and web approaches can provide printed reports to send to appropriate authorities. There are
drawbacks - setting up the web page or e-mail properly (though a youth can probably provide
help). The fact that many Nigerians still may not have convenient access to computers and
the need to ensure security of the system to protect reporters' anonymity is
Required at all cost.
Written and oral reports have the advantage that many people trust the human link more
than the plastic box or the electronics of phones and e-mails. (Jimoh, R. G. et al, 2014).
2.4 TYPES OF CRIME
There are many different types of crimes but generally Crime occurs in a variety of forms,
crimes can be divided into two main categories are:-
1. Major crimes: this crime is most genuine than different violations and incorporates
   (murders and assaults, and so forth.) it is helpful to quickly investigate what has occurred
   over the most recent 30 years in appreciation of crime examination. Neyroud and Disley
   (2007) brought up, since the survey into the imperfect Yorkshire Ripper enquiry (Byford,
   1981) there has been a drive to 'institutionalize the way significant wrongdoing
   examinations are overseen', Major wrongdoing comprises of the prominent violations,
   for example, murder, equipped burglary and non-date assault. These violations can either
   be unique cases or sequential. On account of sequential wrongdoings, it is moderately
   simple to interface violations together because of clear similitudes regarding business as
   usual or portrayals of guilty parties. This connecting is conceivable because of the
   similarly low volume of such violations. Significant violations as a rule have a group of
   criminologists designated to lead the examination (Jansson, K. 2005).
2. Volume crimes: there are many different types under volume violations and incorporate
   (thievery, vehicle wrongdoing, burglary, robbery, harm, and so forth.) Volume
   wrongdoing examinations. It expected to give a diagram of the analytical procedure and,
   in doing as such, recognize compelling and effective ways to deal with the examination
   and recognition of volume wrongdoing. The audit especially intended to feature from the
   examination proof those insightful practices and Actions that are probably going to
   prompt positive results, conversely volume wrongdoings, for example, theft and
   shoplifting are undeniably increasingly predominant. They are normally sequential in
   nature as wrongdoers proceed to perpetrate numerous such violations. Property
   violations, for example, household theft offenses, submitted by various people are
   profoundly comparable and it is uncommon to have a portrayal of the wrongdoers. This
   makes it hard to interface violations together, most wrongdoing isn't major.
   Singular wrongdoings are of a less genuine nature to society all in all (albeit still genuine
   to the people in question). The shear volume of such violations makes diverse kinds of
   issues for the specialist. The high level of comparability among violations and the
   absence of assets for nitty gritty examination of any one specific wrongdoing makes
   issues in both fathoming a wrongdoing and anticipating comparative future violations.
   The test for cutting edge programming designers is to apply current example coordinating
   and perception procedures to mitigate the issue (Jansson, K. 2005).
2.4 ADVANTAGES OF CRIME REPORTING SYSTEM
Their overall project objective was:
To develop a knowledge-based system that will assist the police in the investigation of
residential break & enter incidents that will illustrate the potential for other applications in
support of police investigations. Eight initial functionality goals were set:
   i.   Provide support for gathering and recording case data.
  ii.   Generate suspect characteristics from case parameters.
 iii.   Provide the investigator with easy access to: - case parameters, other incidents in the
        vicinity, similar cases, patrol officer report narrative, witness information, sighting
        reports, investigators' notes.
 iv.    Identify the MO of suspects and cleared cases.
  v.    Generate a list of possible suspects.
 vi.    Identify patterns in the area.
vii.    Generate reports as appropriate.
viii.   Provide a graphics display capability.
 ix.    This will help the police department to manage their records easily.
  x.    There is no need for a user to go to the police station to file any complaint.
 xi.    If the police doesn’t react to the complaints the user can        forward it to higher
        authorities.
xii.    To provide a secure system to users.
xiii.   Complaint registration.
xiv.    Online first system.
 xv.    Giving feedback.
xvi.    Reduction of workload.
xvii.    Security.
xviii.   Reduced time consumption.
 xix.    No paper work needed.
  xx.    No loss of records.
 xxi.    Centralized database management.
xxii.    Reduce error scope.
 2.5 DISADVANTAGE OF CRIME REPORTING SYSTEM
 In the existing system only our can see the details of particular information about the police
 stations in our state, the existing system has more workload for the authorized person.
 Some drawbacks written below.
    i.   More man power.
   ii.   Time consuming.
  iii.   Consumers large volume of pare work.
   iv.   Needs manual calculations.
   v.    No direct role for the higher officials.
   vi.   Damage of machines due to lack of attention.
  vii.   The size of the database increases day-by-day, increasing the load on the database.
 viii.   At present there is no back up and data maintenance activity.
   ix.   Training for simple computer operations is necessary for the users working on the
         system.
   x.    Time consuming
   xi.   Paper work needed
  xii.   Loss of records
2.6 Existing Crime Information System
An information system (IS) is any framework that changes over information into valuable
data. Kiirya (2007) depicted data frameworks to comprise of segments that associate to
accomplish the goal of giving data about everyday exercises that administrators can use to
control business activities. A data framework contains such components as equipment,
programming, work force, databases, and systems to achieve its destinations. Wrongdoing
Information System (CIS) is any framework that could be utilized to track violations or
criminal cases which can likewise help in getting data relating to specific wrongdoings. CIS
can be utilized to complete measurement examination of wrongdoing submitted with in an
area for example South-Eastern district, Nigeria. (Ugwuishiwu, et al., 2013).
Existing online crime reporting management system does not have such medium by clients
can put their protest from any area. They need to visit their closest police area and take a
duplicate of the protest for future reference. Numerous residents falter to visit any police
headquarters and subsequently source data can't be kept classified. Now and again clashes
happens between the police headquarters with respect to region, implies which region goes
under their police headquarters and the individual get baffled before setting their gripes. In
the event that any resident is a sufferer of wrongdoing, even in the wake of dialing crisis
number, police individual don't ready to find the precise area of that subject. In this present
framework, client's data will be kept secret and just clients whine will be sent to its closest
police headquarters. Clients gripe number will be sent from the server side naturally. For
distinguishing area and true individual, idea of treats and IP tending to has been utilized.
To dispense with the area clashes between police headquarters, the server will assume an
imperative job. It will look through the location table utilizing IP address and forward
message to that police area from where the message has been gotten. It stores only the current
status of criminals like number of cases.
  i.   Existing applications manage the data and various information’s about the criminals
       and their crimes.
 ii.   In present manual system the total process of criminal report generation is not so fast
       and friendly. To solve this kind of problem proposed a better and automated system.
(Awodele, et al., 2015).
The National Crime Information Center (NCIC) is a USA automated database of archived
criminal equity data accessible to practically every law requirement organization across the
nation. It is an across the country framework worked by the Federal Bureau of Investigation
(FBI) devoted to serving and supporting locally, state, and government criminal equity
offices in their main goal to maintain the law and secure people in general. The NCIC ended
up operational on January 27, 1967, with the objective of helping law requirement in securing
criminals and finding stolen property. This objective has since extended to incorporate
finding missing people and further securing law implementation faculty and the general
population. (Ugwuishiwu, et al., 2013).
3.0 CONCLUSION
The project entitled as "Web based of Online Crime Reporting System" is the web based
application it will be very useful for the police department as well as common peoples. This
software provides facility for reporting online crimes, complaints, missing persons and show
related sections. This software is developed with scalability in mind. Additional modules can
be easily added when necessarily. The software is developed with the modular approach. All
modules in the system have been tested with valid data and invalid data and everything work
successfully. Thus, the system has fulfilled all the objectives identified and is able to replace
the existing system. The project provides much security. The Application is made users
friendly to the maximum so that anyone can run the application provided the could access to
the system via the login password. This project manages all details without any risk. All the
objectives were met with satisfaction. The performance of the system is found to be
satisfactory. From a proper analysis of positive points and constraints on the component, it
can be safely concluded that the product is a highly efficient GUI based component. This
application is working properly and meeting to all user requirements. This component can be
easily plugged in many other systems.