Вы находитесь на странице: 1из 10

Chapter 1 INTRODUCTION Background of the Study It has been said before and you hear it everywhere. Information is power.

The notion of information plays a fundamental role in the development of the society. Information is data that has been processed in such a way as to be meaningful to the person who receives it. This approach to information, like most human-centered approaches to information, leads one to emphasize the meaning and use of message, ``what the message is about?" and ``what is known already?" over the information carrying messenger and the message itself (Bob Losee, n.d.). Kuhlthau (2005) depicts the information-search process as a sequential set of intellectual stages: becoming aware of the lack of knowledge or understanding identifying a problem area or topic, exploring the problem, dening the problem, collecting relevant information, and explaining what the person learned. This model does not address the effort required to transition through the various information-seeking stages. Ellis characterizes six different types of information activities: starting, chaining, browsing, differentiating, monitoring and extracting. He emphasizes the information-seeking activities, rather than the nature of the problems or criteria used for determining when to stop the information search process. Dervin (2003) uses the term outcome to denote the informationseeking objective. Accomplishing that objective implies the conclusion of the 1

information-seeking episode. Since it emphasizes the importance of the situation in seeking information and recognizes the episodic nature of information seeking, it does not explicitly address the factors associated with stopping behavior, although sense-making recognizes that given the incomplete nature of reality, the information-seeking process is only ever partially fullled. Duff and Johnson (2003) note that time and money are important constraints on how much information can gather, which illustrates how Stroh et al. (2003) dene acceptable. Lack of sufcient time and money clearly leads the researcher in the study to settle or satisfy when they believe they have enough information to meet their objective. Having an accurate information will produce records that can be used to create reports. International Standards Organization (ISO) 15489-1 defines a record as information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations or in the transaction of business. Regardless of the definition variations and interpretations, the underlying hallmarks of a record are the same. A record requires authenticity, reliability, integrity, and usability. Authenticity provides the record is a true item an accurate representation of a transaction or activity, as purported by its creator at the time of creation. Reliability in terms that the record can be relied upon to be a trusted source of the information it contains. Another is integrity in which the record has not been and cannot be altered. It is complete in form and data. Usability which the record can be repeatedly retrieved throughout 2

its lifecycle and used as an authoritative source of the information contained within it. If an item fails any of these criteria, it is not a record (Mills, 2010). Association of Records Managers & Administrators (ARMA) stated that records are the evidence of what the organization does (Proudfit, 2011). Evidence is a testimony, presentation of documents and records in such items relating to the existence or non-existence of alleged or disputed facts. It is used to support a criminal case. Definitions of what constitutes evidence have been debated, but most agree that evidence is extremely important for researchers, practitioners, and policy makers charged with the task of making decisions around the funding and implementation of violence prevention strategies (Puddy & Wilkins, 2011). As time goes by, wherein more and more evidence materials are added to the stack and piled up, exploring the cabinet looking for the right record means traveling through spatial and temporal area, with a chance of finding information within a great bulk of records as one walks from one shelf to another. With the use of digital repositories, searching of criminal records will be easier. A digital repository is where digital content, assets, are stored and can be searched and retrieved for later use. A repository supports mechanisms to import, export, identify, store and retrieve digital assets (Digital Repositories: Helping Universities and Colleges, n.d). In addition from the article, repositories are important for universities and colleges in helping to manage and capture intellectual assets as a part of their information strategy. A digital repository can 3

hold a wide range of materials for a variety of purposes and users. The demand for user access to computerized records has been growing for more than a decade. Nowadays, it is already possible for vast quantities of digital information to be collected, stored, processed and transferred easily even to handheld devices. (Vibar,2008; Castro & Atkinson, 2009). With a computerized record system, the record keeper can use software to store information, summarize data, generate and print reports and sort transactions into categories and sub-categories. Storage of data is a very valuable component to a computerized system. The data entry process may take you as long as in a handwritten system. Most of the people nowadays are engaging in high technology and as an example of this is the computerized system which includes criminal profiling. Criminal profiling is an investigative tool that investigators use to determine characteristics of the perpetrators personality and to narrow down suspects (Burgess, Forensic). Criminal profiling is a technique that entails coming up with basic characteristics of the unsub, properly known as the unknown subject, and the victims (referred to as the victimology), using evidence and matching that information to historic precedents and psychological analyses as a means to solve the case (Huggo; Burgess, Personal interview). The utilization of behavioural science, as it is formerly called, is all about better understanding criminals who they are, how they think, why they do and what they do as a means to help solve 4

crimes and prevent attacks (Behavioral, n.d). Investigative profiling also has been described as a strategy enabling law enforcement to narrow the field of options and generate educated guesses about the perpetrator (Douglas et al., 2006). Others describe an investigative profile as a collection of leads an informed attempt to provide detailed information about a certain type of criminal and a biological sketch of behavioural patterns, trends, and tendencies (Rossi qtd. in Douglas et al., 2006; Geberth qtd. in Douglas et al., 2006; Vorpagel qtd. in Douglas et al., 2006). In crimes in which neither the offender nor the victim is present, profiling becomes necessary, investigators rely on the only source of information that typically is available in the crime scene which reflects the murderers behaviour and personality in much the same way as furnishings reveal a home owners character (Douglas et al., 2006; Geberth qtd. in Douglas et al., 2006). Thus, criminal profiling appropriately can be conceived as a crime-solving technique. However, it is more than just a textbook framework; members of the U.S. Federal Bureau of Investigation (FBI) actively use criminal profiling techniques to apprehend dangerous criminals (Legros, 2010). As of today, we have reached the era of modernization. New technology have been created, one of this discovery is the computer. The technology has changed the different phase of our lives. Nowadays, with the help of computer, the use of robots and AI (Artificial Intelligence) inclined the field of industry and causes economy and education more spare time. Computer promotes our way of 5

living in upgrade, an ease to almost everything. In recent years, the increased flexibility and user-friendliness of computer databases make these systems a crucial business component. In fact, some establishments are now using Computer Database Management System for a faster and safer manifestation of data. Databases are mainly used in record management systems, profiling systems, information systems and other more systems that have many data. The PNP currently has a profiling system which is use by all police stations in the region. All of their criminal profiles are recorded on a database. The police station has many crime cases and as the cases increase more records are recorded. Making the records hard to locate. In addition storage of this records are far increasing. However, PNP encounters problems in maintaining and recovering criminal profiles using the existing system. The existing system does not have a search feature, sorting of records and summary reports. In the existing system, records are manually traced because the system does not have a search engine. The problem encountered also affects the updating and retrieving records. For safekeeping and fast data processing, the developers want to update the existing system and inspired to initiate a project entitled PNP E-Rogue Profiling System. This study is designed to achieve effectively in collecting and retrieving of criminal records. Thus the researchers also propose a development of a database 6

for criminal profile for the benefit of police station, this programmed database is of great help to the mechanism and can improve the function of the police station to be more organized in keeping files and records. In addition with the PNP ERogue Profiling System we can easily produce statistical reports and the ease of service will be achieved. Conceptual Framework The developers used Input-Process-Output (IPO) to present paradigm of the study that illustrates the relationship between the input and output. The paradigm of the study exhibits the skeletal framework of the research study. The paradigm in Figure 1.1 illustrates the conceptual framework of the study on how to come up with the output of the proposed system. The first input in the PNP E-Rogue Profiling System are the existing and future criminal records. The functional requirements will provide the guidelines in the development of the system as well as the features of the system. The phases of Extreme Programming (XP) will be the basis for the development of the system. This includes the following phases; requirements gathering, analysis, design and implementation. The result of the study would be a PNP E-Rogue Profiling System.

Input Output

Process

Data needed for the PNP E-Rogue PNP E-Rogue Profiling System

Profiling System. Extreme Programming Requirements Analysis System Design Development Testing Maintenance

Hardware and software

requirements of the system

Features of the system

8 Feedback

Figure 1.1 Research Paradigm

Statement of the Objectives The project study aims to design and develop a PNP E-Rogue Profiling System. Specifically, it sought to attain the following objectives: 1. to identify the data needed for the proposed system; 2. to determine the hardware and software requirements of the system; 3. to specify the features of the system. Significance of the Study The project study aims to enhance the existing system. The beneficiaries of the study are the following: Police Station. With the use of the propose system, the police station will benefits through enhancing their existing system. Police Officer. The Police Officer is the one who will manage the PNP E-Rogue System. The Police officer can easily look for the records that they will use. He or she can also check records in order for them to review records. Future Developers. This document will serve as a guide for future developers so that they can make another related system. Also using this document future developers can enhance the system. Future Researchers. This document may serves for the future researchers as their reference or guidelines if they tend to developed similar studies. And they could enhance the system by adding new features and modifications. Scope and Limitation PNP E-Rogue Profiling System covers the improvement of the existing 9

system. The propose system will provide search engine, sorting of the records and summary of the statistical reports. In this project study, it will also have mapping in which they can browse incidents and criminals involved in every sectors. Details and abstracts of the project study will be presented initially as an added feature of the proposed system. The said system will have security measures wherein police officers will have a user account so that they can access records in the system. This is important because this records are classified that is why the system has only limited access to user account holders. Definition of Terms The following terms used in this study were operationally defined by the developer to facilitate understanding. Computerized. This is the conversion of manual to digital. Digital Repositories. This is an online are for collecting, preserving and disseminating research journal and dissertation in digital form. Electronic. This are things that are powered by electricity. Profiling. This is the act or process of concluding information about a person based on known traits or tendencies. Profiling System. It is the system use to provide information about a person. Rogue. It is a person who are dishonest, other term for criminals.

10

Вам также может понравиться