Вы находитесь на странице: 1из 40

WEB BASED CRIME REPORTING INFORMATION

SYSTEM

ABDI SHAKUR OMAR HAAJI


SHARIF MAHMUD KHALIF
MOHAMUD OMAR AHMED
CABDULLAHI CALI XIRSI

SUBMISSION OF GRADUATION PROJECT FOR PARTIAL


FULFILLIMENT OF THE DEGREE OF BACHELOR OF
SCIENCE IN COMPUTER APPLICATION

JAMHURIYA UNIVERSITY OF SCIENCE AND


TECHNOLOGY
(JUST)

FACULTY OF COMPUTER APPLICATION AND


INFORMATION TECHNOLOGY

DECEMBER 2018

1
Table of Contents
CHAPTER ONE .................................................................................................................... 4
1.1 INTRODUCTION ................................................................................................... 4
1.2 BACKGROUND OF THE STUDY........................................................................ 5
1.3 PROBLEM STATEMENT ..................................................................................... 8
1.4 RESEARCH OBJECTIVES.................................................................................... 8
1.4.1 GENERAL OBJECTIVE ................................................................................. 8
1.4.2 SPECIFIC OBJECTIVE .................................................................................. 9
1.5 RESEARCH QUESTIONS ..................................................................................... 9
1.6 SCOPE OF THE STUDY ....................................................................................... 9
1.7 SEGNIFICANT OF THE STUDY........................................................................ 10
1.8 ORGANIZATION OF THE STUDY ................................................................... 10
CHAPTER TWO LITERATURE REVIEW ...................................................................... 12
2.1 INTRODUCTION ................................................................................................. 12
2.2 HISTORY OF CRIME REPORTING .................................................................. 14
2.3 RELATIONSHIP BETWEEN POLICE AND CRIME ........................................ 18
2.4 WHAT IS A CRIME? ........................................................................................... 20
2.4.1 Crime Management ........................................................................................ 20
2.4.2 Crime Reporting ............................................................................................. 21
2.4.3 Reporting Methods ......................................................................................... 22
2.5 TYPES OF CRIME ............................................................................................... 23
2.6 ADVANTAGES OF CRIME REPORTING SYSTEM ........................................ 25
2.7 DISADVANTAGE OF CRIME REPORTING SYSTEM ................................... 26
2.8 Existing Crime Information System ...................................................................... 27
2.9 CONCLUSION ..................................................................................................... 29
Chapter III: Methodology .................................................................................................... 30
3.1 Introduction ............................................................................................................... 30
3.1 Methodology ............................................................................................................. 31
3.2 System Description ................................................................................................... 31
3.3 System Development Environment........................................................................... 32
3.4.1 FRONT END TOOL: ..................................................................................... 32
3.3 System Features ............................................................................................................. 35
3.4 Development methodology requirements ............................................................. 35
3.5 HARDWARE REQUIREMENT .......................................................................... 36
3.6 SOFTWARE REQUIREMENT ............................................................................ 36

2
3.7 CONCLUSION ..................................................................................................... 37

3
CHAPTER ONE
1.1 INTRODUCTION

Crime is a human ordeal and is as old as humankind, and Crime is land. It happens at an

explicit place, explicit time and for an explicit reason. It can influence everybody when,

Modern Society is portrayed by expanding dimensions of worldwide social portability

and vulnerability relating to levels of risk posed by internal and external security

threats. Inside this atmosphere security driven by innovation is progressively

being used by governments, corporate bodies and people to screen and decrease chance,

there has been an acknowledgment that the criminal equity framework is restricted in its

ability to control crime which has prompted the investigate of different roads for

handling wrongdoing And this has given a market to privately owned businesses to

push forward develop mechanical security advancements. (Jimoh, R. G. et al, 2014).

This system was gone for execute a Criminal Records Management System, It is a

database framework in which the police keep the record of offenders who have been

captured, to be captured, or got away. This will help the police division in improved

administration of data. The principle substances in the entire procedure includes, the

applicant (the person who documents a First Incident Report (FIR)), injured person,

charged or criminal, case, and examining officer, CRMS tracks the candidate,

unfortunate casualty, denounced, FIR, case and examination officer elements. The

system strength lay in that it takes into account stockpiling of many information for a

criminal, the proposed CRMS improves the wrongdoing recording tasks of the NPF.

The information used by the CRMS is stored in a centralized database which holds

information about criminals, wrongdoing and clients of the framework. The database is

the reason for all activities in the framework and can be easily updated and used to

4
help in the majority of the framework's rules, that is, the all the required data is

put away in one central area and in this way is effectively available. (Awodele, O. et al,

2015).

1.2 BACKGROUND OF THE STUDY

In the late 1980's the London Metropolitan Police imagined CRIS as an Electronic

Framework to supplant the paper based wrongdoing announcing the Framework

With a database covering the whole Metropolitan Police territory.

Different arrangements were attempted however it was just in August 1994 when an

agreement was concurred with EDS Ltd. in light of new elite PCs and information arranges

that the vision could be understood, The data is put away in an Ingress database

appropriated crosswise over two VAX 7600 focal PCs that reflects every one of the 63

Divisional databases and is refreshed progressively, the information is put away

continuously any solicitations for data will naturally incorporate the most a la mode result,

the framework has created data that has prompted numerous captures, the primary detailed,

being identified with vehicle wrongdoing,

Officers utilized the framework to develop an image of a vehicle wrongdoing wave

in Surbitan, Southwest London and found that they pursued an example

of time, area, technique and kind of vehicle Stolen, the Police built up a distraction vehicle

and got the guilty parties inside two hours. This is an illustrative case of how a modernized

criminal examination programming can be utilized for master dynamic policing. (Adderley

et al, 2001).

5
"The criminal record" is definitely not a self-characterizing term. Police,

prosecutorial, legal,

Probation and Jail records all contain data about people who have been captured,

charged, Mediated, condemned and exposed to network and institutional control

and discipline.

These offices' records all contain data that, whenever revealed to potential bosses

and others, would probably have negative ramifications for the record-

subject. Accordingly, it may be progressively precise to discuss criminal records, In the

U.S., individuals typically signify,

"Criminal record" to allude to a person's history of captures and in addition feelings Jacobs

2015, There is an across the country police-made – and kept up criminal record framework,

in light of captures, to which many, however not all businesses, approach. In any case,

all businesses and every other person do approach state-level criminal court records. Today,

these court records are digitized. Utilizing this data source, private data merchants duplicate

and pitch criminal record data to managers and any other person willing to pay

an unobtrusive charge. Every European nation has a National Register (NCR)

Conviction that records data about its natives' feelings. Captures and different contacts with

law requirement offices are not part of the 'criminal record', another essential inquiry is to

what extent criminal record data is kept. (Jacobs, J, et al 2015).

Criminology scientists have encouraged the making of elective announcing strategies that

fill in as an intervening example between observer’s dread of reaching the police and police

objective for counteracting and fathoming wrongdoing [22, 28]. Occurrences of Internet

6
use to report wrongdoing presently exist. The FBI Tips and Public Leads System and the

Claremont University Consortium's Silent Witness Program are precedents. Utilizing the

Internet, these frameworks address the worries and fears of exploited people Stood up to

with the choice to document or not record a report. (Iriberri, A, et al 2010).

We are building up a PC based wrongdoing detailing and talking framework that witnesses

could use to report wrongdoing or suspicious exercises to strategy secretly while

guaranteeing the data is of such quality that police can start an examination. The

wrongdoing revealing and talking framework use characteristic dialect handling innovation

and psychological meeting strategies to give observers a human conversational-style

interface to facilitate the meeting procedure and expand memory review. The framework

speaks to the primary PC use of the intellectual meeting. In this article we portray one

experimental assessment to test the adequacy of the PC framework contrasted with the

viability of up close and personal (human) psychological meeting. (Iriberri, A. 2014).

Crime is "A demonstration submitted or overlooked disregarding a law precluding or

telling it and for which discipline is forced upon conviction", Recorded wrongdoing

measurements have been gathered since 1857. Police recorded wrongdoing insights gave a

decent measure of patterns in all around detailed wrongdoing which could be utilized at

neighborhood level to examinations the example of wrongdoing. Notwithstanding, they do

exclude violations that have not been accounted for to police or that the police chose not to

record. (Grover, V, 2007).

7
1.3 PROBLEM STATEMENT

Crime Reporting System is the ground-breaking system that works Criminal

arrangement sites. In CID is utilizing manual enrollment of MS-applications,

for example, get to database, and exceed expectations spreadsheet to keep record

the subjects. This task is being made by CID in Mogadishu. It's proposed to utilize

Somali natives to advise their objections to police headquarters, however the office has

numerous issues including residents can't contact straightforwardly to the Police station

when the experience some unit-security issues. They need to go straightforwardly to the

police headquarters to report Crime. So this undertaking will help encourage individuals

To transmit their worries or grievances through online to the CID by utilizing on the

web wrongdoing revealing framework.

1.4 RESEARCH OBJECTIVES

1.4.1 General Objective

Our main objective is to solve the problem of the CID on Criminal Records system,

CID Did not have online Registration Criminal Reports management system, So that we

discover the needs of Crime Recording and we doing online Crime Reports

management system.

8
1.4.2 Specific Objective

i. To retrieve criminals already stored in the system for their

information

ii. To reduce the number of lost records for the criminals.

iii. To allow the citizens report crimes online at any place.

1.5 RESEARCH QUESTIONS

i. How to solve the manual crime reporting registration system?

ii. How to retrieve criminals already stored in the system for their information?

iii. How to reduce the number of lost records for the criminals?

iv. How to allow the citizens report crimes online at any place?

1.6 SCOPE OF THE STUDY

The overall aim of CRIS is to develop electronic filing of criminal records that will produce

an automatic edition of the applicant’s certified criminal record and simultaneously provide

to the citizen the possibility of online application submission for the criminal record extract.

The criminal record entries are kept in the repository the same time with the relative paper

ones, criminal Record Information System (CRIS) has been implemented as an accessible

web-based query application, which provides timely and accurate information on offenders.

The public criminal record request service is a web-based information delivery application

which allows citizens to request the extract of their public criminal records. Identification

of the citizen takes place at the public agency in order to receive the criminal record

document. This project, the web based online crime reporting system was made by CID in

Somalia to manage entire information for the registered criminals.

9
1.7 SEGNIFICANT OF THE STUDY

The important thing of this research first is to get new knowledge. Second is to discover the

needs of CID crime reporting system because of every police station needs Online Crime

Reporting Management System. This project has significant importance, because it will

provide assistance to the citizens of Somalia. First Allow citizens report crimes online at

any place without having them to physically appear to police stations for reporting the

crimes. It allows the citizens to send complaints by online, And Provides platform to the

report missing persons and their property.

1.8 ORGANIZATION OF THE STUDY

 Chapter 1 – Introduction. This chapter discusses with introduction, background of

the study, problem statement, Research objectives, Research Questions, Scope of the

study, and Significance of the study.

 Chapter 2 – Literature Review. This chapter reviews works done in the earlier

studies or researches which are related to the project Web based crime reporting

system.

The differences between crime and criminal also will be discussed in this chapter.

This chapter also will discuss about the importance of the crime reporting.

 Chapter 3 – Methodology. This chapter discusses the methodological development of

this project, which includes the techniques used. Flowcharts of the software

programming are included, Even though this project just includes the software parts,

but the best hardware selections are also discussed.

10
 Chapter 4 - Design and Analysis- in this chapter the researchers are going to

demonstrate the logical design of the system that is to be developed by drawing the

Entity Relationship Diagrams (ERDs) and the Data Flow Diagrams (DFDs) to show

the flow of the data within the system

 Chapter 5 - Implementation and Coding- this chapter is where the system is

developed physically by using software tools.

 Chapter 6 - Conclusion and Recommendation This chapter highlights the overall

summary of this project based on the objectives and results. Problems and

recommendations for future works to improve it.

11
CHAPTER TWO LITERATURE REVIEW

In this section, we analyze systems that are akin to the proposed system. We will focus on

the systems that are closest in functionality to the CRMS, highlighting their key features,

similarities, history, relationship b/w crime and police, advantages and disadvantages and

existing system.

2.1 INTRODUCTION

Crimes are a typical social issue influencing the personal satisfaction and the monetary

development of a general public. In spite of the fact that wrongdoings could happen all

over, usually offenders chip away at wrongdoing openings they face in most natural

regions for them, by giving an information mining way to deal with decide the most

criminal hotspots and discover the sort, area and time of perpetrated violations, we want

to raise individuals' mindfulness in regards to the perilous areas in certain timespans

(Almanie et al., 2015).

Crime Report It can likewise be characterized as the correspondence of data orchestrated

in an exact, succinct, clear and complete way, which at that point turns into a record of an

offered episode to an invested individual for choice to be made. There are numerous sorts

of wrongdoings, lawbreakers and unfortunate casualties. There are not kidding

wrongdoings and little offenses (Jakkhupan, et al., 2014).

Crime Reporting System will address the refered to explanations behind not announcing,

yet in addition the need of police offices for progressively precise, complete, and reusable

data that may save their time and assets to designate them to policing the roads an online

12
arrangement is valuable as the arrangement is innately distributive. This distributive

normal for the online arrangement helps in getting the diverse police headquarters to

share data and get in contact with each other. It likewise enhances work proficiency of the

office. Utilizing this application data dealing with will be simple and quick and

illuminating cases will be quick (Jaiswal, et al., 2013).

Crime Report System is a system used to report crimes. It very well may be utilized to

report Crime. This venture is primarily valuable for police headquarters. This framework

will deal with every one of the exercises in a police headquarters utilizing PCs. As of

now, every one of the works are done physically, by mechanizing every one of the

exercises inside a police headquarters can be overseen effectively and successfully, This

framework will deal with every one of the exercises in a police headquarters utilizing

PCs, It is a critical thinking movement that requires concentrated correspondence

between the framework clients and framework engineers. The goals of this application is

to keep up a mechanized record of all the F.I.R against wrongdoing (Jain, et al., 2017).

Many researchers trust that revealed wrongdoing information are defiled by estimation

mistake emerging from contrasts in police division detailing rehearses crosswise over

locales, innovative advances in wrongdoing recording, and changes in wrongdoing

announcing by exploited people after some time. Regardless of whether such issues exist,

be that as it may, they don't really block the utilization of revealed wrongdoing

measurements for deciding the adequacy of strategies intended to diminish wrongdoing

(Levitt, et al. 1998).

Lately police powers have been improving their conventional strategy for wrongdoing

revealing with new mechanical progressions to build their yield by effectively recording

violations to help their examination (Adderley and Musgrove 1999). Information isn't

13
only a record of wrongdoings, and it likewise contains important data that could be

utilized to connect wrongdoing scenes dependent on the usual way of doing things (MO)

of the offender(s), recommend which guilty parties might be in charge of the wrongdoing

and furthermore distinguish those wrongdoers who work in groups (guilty party systems)

and so forth. In this day and age, PCs are assuming a noteworthy job in the examination

of a wide range of wrongdoing from those that are considered as volume wrongdoing

(thievery, vehicle wrongdoing and so on.) to significant wrongdoing, for example,

misrepresentation, medicate dealing, murder, and so on.( Grover, et al. 2007).

2.2 HISTORY OF CRIME REPORTING

The role of computers has been increased in all walks of life from the finance sector to

supermarkets. In recent years police forces have been enhancing their traditional method

of crime reporting with new technological advancements to increase their output by

efficiently recording crimes to aid their investigation (Adderley and Musgrove 1999),

Data is not just a record of crimes, it also contains valuable information that could be

used to link crime scenes based on the modus operandi (MO) of the offender(s), suggest

which offenders may be responsible for the crime and also identify those offenders who

work in teams (offender networks) etc, In today’s world, computers are playing a major

role in the investigation of all types of crime from those that are considered as volume

crime (burglary, vehicle crime, etc.) to major crime such as fraud, drug trafficking,

murder etc., It is not an easy task for a Police analyst to manually unravel the inherent

complexities within police data and this problem is compounded when the analysis is

undertaken by a team. The distribution of the data to the team may cause significant

14
information, which could be useful to solve the crimes, to be missed as each member is

not in possession of all relevant facts. For a long time, criminologists and statisticians

have been applying their skills and knowledge trying to predict when and where the next

set of crimes will occur, with varying degrees of success. The volume of crime and the

greater awareness of modern criminals put a strain on the existing methods. Human

reasoning fails when presented with millions of records. Therefore, there is clearly a

requirement for a tool kit to assist in analyzing the data which will make the best use of

limited resources. (Grover, et al., 2007).

Crime is one of the human security problems confronting humanity across the world.

Nations have grappled to contain the rising incidence of homicide, armed robbery, and

kidnap, drug trafficking, sex trafficking, illegal gun running and host of others, United

Nations Office on Drugs and Crime in 2011 reported that homicides globally were

estimated at 468,000 and more than a third (36%) was estimated to have occurred in

Africa, 31% in The Americas, 27% in Asia, 5% in Europe and 1% in the tropical Pacific

region 3, Africa has been on the forefront on global statistics on crime. South Africa and

Nigeria have recorded high incidents of violent and non-violent crimes in recent times.

According to Africa Check, that incidents of murder increased from 15 609 murders in

2011/12 to 16 259 murders in 2012/13 in South Africa, with increase of 650 murder cases

or a 4,2% increase when comparing the total numbers of murders with the previous

years5. According to the same report, murders and attempted murders that take place

during aggravated robbery or inter-group conflict (such as gang or taxi violence), and

vigilantism make up between 35% and 45% of all murders and attempted murders 6.

(Osawe, et al., 2015).

15
Between 1971 and 1975, the United States Department of Justice conducted victimization

surveys in 26 large American cities. Approximately 10,000 household interviews were

conducted in each city. Information was collected on victimization and reporting for a

variety of crimes and is collected in the United States Department of Justice (1975 a, b,

1976) reports. The strength of these data is the availability of city identifiers that can be

linked to the police staffing data collected annually in the FBI's Uniform Crime Reports.

(Levitt, 1998).

The concept of Crime can be viewed as an: illegal act (an action prohibited by Law or

failure to act as required by law); illegal activity that involves breaking the Law; immoral

activity that is considered unacceptable act that is shameful, unwise or regrettable. Crime

by the Law of the Federal republic of Nigeria (FRN, 1999) is defined as „An act or

omission which renders the person doing the act or making the omission liable to

punishment under the criminal code, or any Act or Law” Crime is brought about by the

violation of the Law as established by the government at all levels, Crime is an infraction

of both the basic principles of law and order and the norms of civilized behavior, Crime is

an offence against the value system of a society. The cost and effects of crime vary

among the various segments of the population and touch almost everyone by some degree

and in general as the economic growth and development of countries increase, it would be

expected that crime level reduces, this may not necessarily be. The various cost of crime

to victims and the society or the economy include; loss of income, property losses, loss in

community productivity, etc. Some other cost of crime, which are less tangible; include

psychological trauma on victims and their family and friends, pain and suffering and a

lower quality of life. In all of these and other associated losses, the ultimate cost is loss of

life (Osawe, et al., 2015).

16
Deterrence Theory and Crime Schelling developed deterrence theory in 1966 as a

preventative military strategy during the Cold War (Paternoster, 2011). The emphasis of

deterrence theory is that punishment serves as a way to minimize and prevent criminal

behaviors (Ritchey & Nicholson-Crotty, 2011; Rizzolli & Stanca, 2012). Deterrence

operates in two ways (a) specifics and (b) generals (Paternoster, 2010; Piquero,

Paternoster, Pograsky, & Loughran, 2011). Specific deterrence pertains to deterring an

individual from committing another crime, whereas general deterrence pertains to

punishing an individual as an example to the general population (Kabia 2016).

Montaldo (2013) said that crime occurs when someone breaks the law by an overt act,

omission or neglect that can result in punishment. A person who has violated a law, or

has breached a rule, is said to have committed a criminal offense. According to National

Crime Prevention Strategy (1996), Crime results in the deprivation of the rights and

dignity of citizens, and poses a threat to peaceful resolution of differences and rightful

participation of all in the democratic process. It inhibits our citizens from communicating

with one another freely, from engaging in economic activity and prevents entrepreneurs

and investors from taking advantage of the opportunities, which our country offers.

Government regards the prevention of crime as a national priority. (Ugwuishiwu, et al.,

2013).

17
2.3 RELATIONSHIP BETWEEN POLICE AND CRIME

The measure of the police force systematically influences the willingness of exploited

people to report wrongdoing or a police division's affinity authoritatively to record injured

individual wrongdoing reports, at that point UCR information will downplay the genuine

adequacy of police in decreasing wrongdoing. Exploited people might be bound to report

violations to the police when the apparent probability of a wrongdoing being understood is

high. Moreover, the prepared accessibility of a cop at the scene of a wrongdoing may

likewise prompt more wrongdoing reports, and it is anything but difficult to envision that

increments in police labor will influence the probability that native grumblings are

authoritatively recorded by police divisions. On the off chance that detailing/recording

inclination (from now on alluded to as "revealing" predisposition for quickness) is

available, announced wrongdoing rates may increment with the extent of the police

constrain, regardless of whether the genuine exploitation rate is falling. The way that

considerably not exactly 50% of all wrongdoings secured by the FBI's Uniform Crime

Reports are really answered to the police uplifts worry over the significance of announcing

inclination. Announcing inclination is often refered to as a clarification for the inability to

reveal a connection between detailed wrongdoings and police nearness e.g., Greenwood

and Wadycki, 1973; Swimmer, 1974; Thaler, 1977, 1978; CarrHill and Stern, 1979;

Cameron, 1988; Devine et al., 1988. (Levitt 1998).

Police Information Management System (PIMS) is a disconnected undertaking that enables

clients to store police office's case subtleties, Complaint Details, First Information Report

(FIR) Details, and so forth. This Software Package permits Police Departments to store

every one of the subtleties identified with the office and use them at whatever point

18
fundamental. The task reports different cases, FIR report, charge sheet report, Most Wanted

Criminals record, finance, participation reports and furthermore can transfer and view

criminal photographs and filtered archives. The prerequisites for this framework was

gathered from Manglaore Police Station (Ugwuishiwu, et al., 2013).

The center mission of the police is to control wrongdoing. Nobody question this. To be

sure, proficient wrongdoing battling appreciates wide open help as the essential system of

policing definitely in light of the fact that it epitomizes a profound promise to this goal.

Interestingly, other proposed methodologies, for example, critical thinking or network

policing show up superficially to obscure this center.' If these techniques were to leave the

network increasingly helpless against criminal exploitation, they would be unwanted

options. In making a decision about the estimation of elective police systems in controlling

wrongdoing, in hunting down approaches to avoid or control genuine wrongdoing, the

police search for hastening causes. While it might be helpful to analyze what some call the

underlying drivers of wrongdoing (e.g., social unfairness, unequal financial chance, poor

tutoring, frail family structures, or dysfunctional behavior), such things are moderately

irrelevant from a police viewpoint since the police practice little impact over them. The

police work on the outside of public activity. They should deal with episodes,

circumstances, and individuals as they are presently not social orders or individuals as they

may have been. Hence, the promptly hastening reasons for genuine wrongdoing are

definitely more vital to the police than are more extensive inquiries regarding the main

drivers of wrongdoing. (Moore, et al., 1998).

19
2.4 WHAT IS A CRIME?

Crime is a geological. It happens at a particular spot, explicit time and for a particular

reason. It can influence everybody and anybody whenever. Wrongdoings are intricate and

continually evolving. Social and mechanical changes presented new targets, apparatuses

and thought processes in wrongdoing. This online web application for keeping up the best

possible everyday citizens grievances for the police office by utilizing this application

individuals, who are apprehensive or don't have enough time to go the police headquarters

for griping about their own legitimate issues here they can give their protest through online

to record any kind of grumbling. It comprises of grumbling box where the general

population can enroll their grievances. Here clients will have the mindfulness about laws

and the particular disciplines for the wrongdoing (Awodele, et al., 2015).

2.4.1 Crime Management

The event of wrongdoing isn't irregular. It is spatially conveyed in examples a few

examples are found while others are most certainly not. Factor, for example, social class,

salary level and the condition plays parts in the sorts of wrongdoing that are submitted.

Assets and additionally an absence of assets can impact the likelihood of wrongdoings

submitted in some random region. As a result of the intricacy of wrongdoing, wrongdoing

must be overseen. Wrongdoing as different definitions relying upon which viewpoint one is

taking a gander at it from. For this exploration wrongdoing is characterized as

"infringement of law or an occasion of this, deserving of the state." Management, then

again, is the way toward coordinating and controlling the assets of an association such As

20
its staff, materials, and hardware to accomplish the objectives of the association.

Wrongdoing the board is thusly characterized as controlling, coordinating, and organizing

police assets (cash, gear, and faculty) to keep the infringement of law and where it has been

damaged, to secure the culprits and indict them (Jimoh, R. G. et al, 2014).

2.4.2 Crime Reporting

The past discoveries are enough to persuade readers regarding the significance that

detailing conduct has for the criminal equity framework and the network. Residents,

through the detailing of their wrongdoing encounters begin the criminal equity hardware

which thusly empowers examination of violations by police, the arraignment and

preliminary of guilty parties, and their discipline. The deterrent impact of criminal equity is

potentiated too, then again, non-announcing blocks access to remuneration plans, guilty

parties not being captured, and the objective of an increasingly evenhanded criminal equity

framework being accomplished. Be that as it may, not all the exploitation occurrences are

wrongdoings in a specialized sense, and of those which are, some are minor for sure, the

police will total criminal offense reports in just few these episodes. Expanded readiness to

report what individuals see as violations would result in expanded police endeavors in

managing minor episodes, not all of which may result in attractive results to the people in

question; an issue with possibly pessimistic ramifications for the detailing of maybe

progressively genuine future occurrences. Wrongdoing exploitation is an outflow of social

clash, detailing of apparent exploitation encounters to the police relies on a perplexing

arrangement of variables going from earnestness of episodes to trust in the criminal equity

21
framework, A progressively total comprehension of non-announcing, its dispersion and its

associates will enable us to evaluate the execution of our criminal equity offices.

2.4.3 Reporting Methods

Effective methods of anonymous reporting include:

• The tip box

• The telephone coupled with an answering machine or voice mail

• E-mail to a central address

• A web site that directs reports to a central address

• Oral reports

The tip box usually consists of several locked boxes at key points around the school or

neighborhood. Each box has a slot for inserting written reports. Boxes need to be located in

Places that are reasonably populated - not deserted and not in the middle of heavy traffic.

The box (and education about using it) should remind students and citizens of what's

needed For a good report - a dated, legible note describing as much as possible what

happened where, when, how and by whom. Advantages of the tip box include low cost, low

reliance of technology and written records. Disadvantages include unreadable reports and

limited access. Tip boxes also require that someone physically visit and collect reports from

each of The boxes.

Telephone reporting systems offer a number of variations.

Some include a toll-free line directed to a cell phone. Some reporting lines are partnered

with a hotline. Calls left on a voicemail or answering machine can be retrieved from

anywhere. The report taker doesn't have to visit boxes. The telephone approach allows

22
students to call from school, from home, from a friend or from a pay phone. People tend to

be comfortable talking on the phone, so this approach leaves no lasting record of the report,

unless messages taped or transcribed and checked for accuracy. It also requires resources -

funds or in-kind donations for the equipment, the telephone service, and a secure area in

which to house the Equipment.

E-mail and web sites have proved successful in reaching out to those who are

electronically literate. Some systems have both an e-mail box and a web site for crime

reports. Both email and web approaches can provide printed reports to send to appropriate

authorities. There are drawbacks - setting up the web page or e-mail properly (though a

youth can probably provide help). The fact that many Nigerians still may not have

convenient access to computers and the need to ensure security of the system to protect

reporters' anonymity is Required at all cost.

Written and oral reports have the advantage that many people trust the human link more

than the plastic box or the electronics of phones and e-mails. (Jimoh, R. G. et al, 2014).

2.5 TYPES OF CRIME

There are many different types of crimes but generally Crime occurs in a variety of forms,

crimes can be divided into two main categories are:-

1. Major crimes: this crime is most genuine than different violations and incorporates

(murders and assaults, and so forth.) it is helpful to quickly investigate what has

occurred over the most recent 30 years in appreciation of crime examination. Neyroud

and Disley (2007) brought up, since the survey into the imperfect Yorkshire Ripper

23
enquiry (Byford, 1981) there has been a drive to 'institutionalize the way significant

wrongdoing examinations are overseen', Major wrongdoing comprises of the prominent

violations, for example, murder, equipped burglary and non-date assault. These

violations can either be unique cases or sequential. On account of sequential

wrongdoings, it is moderately simple to interface violations together because of clear

similitudes regarding business as usual or portrayals of guilty parties. This connecting is

conceivable because of the similarly low volume of such violations. Significant

violations as a rule have a group of criminologists designated to lead the examination

(Jansson, K. 2005).

2. Volume crimes: there are many different types under volume violations and

incorporate (thievery, vehicle wrongdoing, burglary, robbery, harm, and so forth.)

Volume wrongdoing examinations. It expected to give a diagram of the analytical

procedure and, in doing as such, recognize compelling and effective ways to deal with

the examination and recognition of volume wrongdoing. The audit especially intended

to feature from the examination proof those insightful practices and Actions that are

probably going to prompt positive results, conversely volume wrongdoings, for

example, theft and shoplifting are undeniably increasingly predominant. They are

normally sequential in nature as wrongdoers proceed to perpetrate numerous such

violations. Property violations, for example, household theft offenses, submitted by

various people are profoundly comparable and it is uncommon to have a portrayal of

the wrongdoers. This makes it hard to interface violations together, most wrongdoing

isn't major.

Singular wrongdoings are of a less genuine nature to society all in all (albeit still

genuine to the people in question). The shear volume of such violations makes diverse

24
kinds of issues for the specialist. The high level of comparability among violations and

the absence of assets for nitty gritty examination of any one specific wrongdoing makes

issues in both fathoming a wrongdoing and anticipating comparative future violations.

The test for cutting edge programming designers is to apply current example

coordinating and perception procedures to mitigate the issue (Jansson, K. 2005).

2.6 ADVANTAGES OF CRIME REPORTING SYSTEM

Their overall project objective was:

To develop a knowledge-based system that will assist the police in the investigation of

residential break & enter incidents that will illustrate the potential for other applications in

support of police investigations. Eight initial functionality goals were set:

i. Provide support for gathering and recording case data.

ii. Generate suspect characteristics from case parameters.

iii. Provide the investigator with easy access to: - case parameters, other incidents in the

vicinity, similar cases, patrol officer report narrative, witness information, sighting

reports, investigators' notes.

iv. Identify the MO of suspects and cleared cases.

v. Generate a list of possible suspects.

vi. Identify patterns in the area.

vii. Generate reports as appropriate.

viii. Provide a graphics display capability.

ix. This will help the police department to manage their records easily.

x. There is no need for a user to go to the police station to file any complaint.

25
xi. If the police doesn’t react to the complaints the user can forward it to higher

authorities.

xii. To provide a secure system to users.

xiii. Complaint registration.

xiv. Online first system.

xv. Giving feedback.

xvi. Reduction of workload.

xvii. Security.

xviii. Reduced time consumption.

xix. No paper work needed.

xx. No loss of records.

xxi. Centralized database management.

xxii. Reduce error scope.

2.7 DISADVANTAGE OF CRIME REPORTING SYSTEM

In the existing system only our can see the details of particular information about the police

stations in our state, the existing system has more workload for the authorized person.

Some drawbacks written below.

i. More man power.

ii. Time consuming.

iii. Consumers large volume of pare work.

iv. Needs manual calculations.

v. No direct role for the higher officials.

26
vi. Damage of machines due to lack of attention.

vii. The size of the database increases day-by-day, increasing the load on the database.

viii. At present there is no back up and data maintenance activity.

ix. Training for simple computer operations is necessary for the users working on the

system.

x. Time consuming

xi. Paper work needed

xii. Loss of records

2.8 Existing Crime Information System

An information system (IS) is any framework that changes over information into valuable

data. Kiirya (2007) depicted data frameworks to comprise of segments that associate to

accomplish the goal of giving data about everyday exercises that administrators can use to

control business activities. A data framework contains such components as equipment,

programming, work force, databases, and systems to achieve its destinations. Wrongdoing

Information System (CIS) is any framework that could be utilized to track violations or

criminal cases which can likewise help in getting data relating to specific wrongdoings. CIS

can be utilized to complete measurement examination of wrongdoing submitted with in an

area for example South-Eastern district, Nigeria. (Ugwuishiwu, et al., 2013).

Existing online crime reporting management system does not have such medium by clients

can put their protest from any area. They need to visit their closest police area and take a

duplicate of the protest for future reference. Numerous residents falter to visit any police

headquarters and subsequently source data can't be kept classified. Now and again clashes

27
happens between the police headquarters with respect to region, implies which region goes

under their police headquarters and the individual get baffled before setting their gripes. In

the event that any resident is a sufferer of wrongdoing, even in the wake of dialing crisis

number, police individual don't ready to find the precise area of that subject. In this present

framework, client's data will be kept secret and just clients whine will be sent to its closest

police headquarters. Clients gripe number will be sent from the server side naturally. For

distinguishing area and true individual, idea of treats and IP tending to has been utilized.

To dispense with the area clashes between police headquarters, the server will assume an

imperative job. It will look through the location table utilizing IP address and forward

message to that police area from where the message has been gotten. It stores only the

current status of criminals like number of cases.

i. Existing applications manage the data and various information’s about the criminals

and their crimes.

ii. In present manual system the total process of criminal report generation is not so

fast and friendly. To solve this kind of problem proposed a better and automated

system.

(Awodele, et al., 2015).

The National Crime Information Center (NCIC) is a USA automated database of archived

criminal equity data accessible to practically every law requirement organization across the

nation. It is an across the country framework worked by the Federal Bureau of Investigation

(FBI) devoted to serving and supporting locally, state, and government criminal equity

offices in their main goal to maintain the law and secure people in general. The NCIC

ended up operational on January 27, 1967, with the objective of helping law requirement in

securing criminals and finding stolen property. This objective has since extended to
28
incorporate finding missing people and further securing law implementation faculty and the

general population. (Ugwuishiwu, et al., 2013).

2.9 CONCLUSION

The project entitled as "Web based of Online Crime Reporting System" is the web based

application it will be very useful for the police department as well as common peoples. This

software provides facility for reporting online crimes, complaints, missing persons and

show related sections. This software is developed with scalability in mind. Additional

modules can be easily added when necessarily. The software is developed with the modular

approach. All modules in the system have been tested with valid data and invalid data and

everything work successfully. Thus, the system has fulfilled all the objectives identified and

is able to replace the existing system. The project provides much security. The Application

is made users friendly to the maximum so that anyone can run the application provided that

could access to the system via the login password. This project manages all details without

any risk. All the objectives were met with satisfaction. The performance of the system is

found to be satisfactory. From a proper analysis of positive points and constraints on the

component, it can be safely concluded that the product is a highly efficient GUI based

component. This application is working properly and meeting to all user requirements. This

component can be easily plugged in many other systems.

29
Chapter III: Methodology

This chapter discusses the procedures and methods used in this project. It also includes the

research design of the project and how the data were gathered, as well as, the research

instruments.

3.1 Introduction

Police provides safety to citizens. It always remains steady for arresting any criminal who

is a threat for the safety of society. After registering the FIR from any citizen, police starts

its work and on that basis it arrests the criminals if proofs are found against them. Once the

criminals are arrested, police starts investigation from them. After getting all the proofs

against the criminal, it is the duty of the police to present all the proofs honestly to the court

so that the right man can get right punishment. The true and right information provided by

the people to police helps a lot in arresting the criminals who try to spoil the peaceful

environment of society.

The objective of the project was to develop a site in which any citizen can report crimes. If

anybody wants to report any kind of crime he/she can do it through the site. The Crime

Management and Reporting System make the crime reporting easier. This project will be

useful for the Police Department.

30
3.1 Methodology

A systematic process was followed for the development of the project. The overall system

development process was carried out into different phases like requirement analysis, design,

coding, testing, debugging and implementation.

At first the present system, that is, manual system was overviewed in brief so that the

deficits and irregularities in the current system would be pointed out. The helped the authors

to identify the problem and find the probable solutions.

The development process was then started with data collection phase which supported the

authors in pointing out the requirement for the proposed system.

The authors of the project have used data provided in the internet and some dummy data for

various purposes involved in the development process.

3.2 System Description

OCRMS is a system which aims at making records of crimes easier and complaints of users

easier. This system provides an easy way to admin to keep track of records of all the crimes

and saves him loads of manual work, this system makes updating of records easier by both

users and admin and provides updated information about the current crimes status in

happening. The developed system was aided in smooth operation of the organization by

improving the mundane tasks.

This project was provided an efficient and reliable way to handle all the daily operations of

the organization ranging from entering the personal information of a crimes or society

complains and to updating the same information or even deleting.

31
To standardize the database required for smooth operation, Integrate subsystem within the

organization into base system for integrated service. Disseminate information about the

organization crimes. To maintain proper record of every criminals.

3.3 System Development Environment

The system has developed in PHP as front end and MYSQL as back end.

3.4.1 FRONT END TOOL:

PHP (Personal Home Page)

PHP is a server side programming language which was designed by Rasmus Lerdof in 1994

the reference implementation is now produced by The PHP Group. As of January 2013,

more than 240 million websites and 2.1 million web-servers installed PHP.

This language will help to get the information from MySQL database to android mobile

application and also help to insert data to MySQL database from android mobile

application.

PHP is a server scripting language, and it is a powerful tool for making dynamic and

interactive Web pages quickly, PHP is a widely-used, free, and efficient alternative to

competitors such as Microsoft's ASP. PHP combined with MySQL are cross-platform (you

can develop in Windows and serve on a Unix platform).

32
MySQL Database

MySQL Database is a free open source database software which will help us to save our

data and to retrieve data through php. MySQL is the second most widely used database in

the world. MySQL was named after the daughter of co-founder Michael Widenius, My.

The SQL stands for Structured Query Language.

MySQL was initially released on 23 May, 1995 by MySQL AB. Now this is owned by

Oracle Corporation. TYPO3, MODx, Joomla, WordPress, phpBB, MyBB, Druphal are

some of the famous software which are using MySQL, Google, Facebook, Twitter, Flickr

and YouTube are some of those famous and large scale websites which are using MySQL.

XAMPP

XAMPP was introduced by Apache Friends on 22 May, 2002. This is an open source cross-

platform web-server solution stack package. This mainly comprises Apache HTTP server,

MySQL database and interpreters for the scripts written in PERL and PHP programming

languages. This was designed with intention to provide test environment on personal

computers without access to internet so that website designers and programmers can use it

to test their websites on their own computers. XAMPP is PHP development environment.

This will help to run PHP, Apache tomcat server and MySQL.

JQUERY

JQuery is advanced JavaScript library of pre-written JavaScript code that can be used in

your

Own coding projects. The Purpose of JQuery is to make it much easier to use JavaScript on

your website. JQuery takes a lot of common tasks that require many lines of JavaScript

code

To accomplish, and wraps them into methods that you can call with a single line of code.
33
The JQuery library contains the following features:

 HTML/DOM manipulation

 CSS manipulation

 HTML event methods

 Effects and animations

 AJAX

 Utilities

(Raza, et al., 2015).

Why did you choose that specific environment?

 PHP runs on various platforms (windows, Linux, UNIX, mac operating system x,

etc.).

 PHP is compatible with almost all servers used today (Apache, IIS, etc.).

 PHP Supports a wide range of databases.

 PHP is a free download it from the official php resources: www.php.net.

 PHP is easy to learn and runs efficiently on the server side.

 PHP can generate dynamic page content.

 PHP can create, open, read, write, delete, and close files on the server.

 PHP can send and receive cookies.

 PHP can add, delete and modify data in your database.

 PHP can encrypt data.

34
3.3 System Features

This application can be easily implemented under various situations.

We can add new features as and when we require. Reusability is possible

As and when require in this application. There is flexibility in all the modules.

 We can update this system as online application.

 The main advantage of online application is that a person can report the crime at

anytime and anywhere.

 User can view the progress of their complaint online.

 By the future technology user can view the case details and progress of the

complaints on their mobile phones.

 Face recognition technology can apply. User or witness of the crime can give the

physical information of the thief.

Reusability is possible as and when require in this application. We can update it next

version.

Reusable software reduces design, coding and testing cost by amortizing effort over several

design. Reducing the amount of code also simplifies understanding, which increases the

likelihood that the code is correct.

3.4 Development methodology requirements

This proposed software runs effectively on a computer system which has the minimum

requirements. The requirements are split into two categories, namely:

35
3.5 HARDWARE REQUIREMENT

Hardware interfaces specifies the logical characteristics of each interface between the

Software product and the hardware components of the system. Many business type

Applications will not have hardware interfaces, since “Crime Reporting System” is an

Application it too will not require any particular hardware interface.

The minimum hardware requirement for developed system and its operations include the

following:

 Minimum RAM: 2 GB. Recommended RAM: 4 GB DDR3

 Internet: 2G Plan or above, bandwidth with at least 1 mbps or above.

 Minimum Processor: 2.20 GHz P IV. Recommended Processor: 3.10 GHz

Core2Duo.

 HDD 20 GB Hard Disk Space and Above

Others: Network interface card, mouse, keyboard, and monitor.

3.6 SOFTWARE REQUIREMENT

The minimum software requirements to run the program are listed below:

i. Microsoft OS: Windows 7/8/8.1/10 (Home and Professional

Editions)

ii. MySQL

iii. JavaScript, PHP/HTML, CSS, JQuery

iv. Browser e.g. Mozilla Firefox, Safari, chrome, Baidu Browser etc.

v. Local Server e.g. WAMP Server, XAMP or Easy PHP Server

vi. System type: 32/64bit


36
3.7 CONCLUSION

In this chapter we discussed the major point of requirement analyze and specification, the

requirement analyze describes the project information about current system, system

description, overview of the system and system features and development environment

contains the specific environment, development methodology requirement contains

hardware requirement and software requirement, and result reached is understanding the

functionality and requirement of the system and easiest access and conclusion.

References

R. G. Jimoh, K.T. Ojulari, & O.A. Enikuomehin (2014). A Scalable Online Crime

Reporting System, African Journal of Computing & ICTs. Vol 7, No. 1. Pp11-20.

Awodele, O., Onuiri Ernest, E., Olaore Olufunmike, A., & Anita, S. O. O. U. E. (2015). A

Real-TimeCrime Records Management System for National Security

agencies, European Journal of Computer Science and Information Technology, 3(2),

1-12.

Adderley, Richard & Musgrove, Peter. (2001). Police crime recording and investigation

Systems – A user’s view. Policing: An International Journal of Police Strategies &

Management. 24. 100-114. 10.1108/13639510110382287.

Jacobs, J., & Larrauri, E. (2015). European Criminal Records & Ex-Offender Employment.

Iriberri, A., & Navarrete, C. J. (2010, January). Internet crime reporting: Evaluation of a

Crime reporting and investigative interview system by comparison with a non-

37
Interactive reporting alternative. In System Sciences (HICSS), 2010 43rd Hawaii

International Conference on (pp. 1-9). IEEE.

Iriberri, A. (2014). Information Extraction and eGovernment:

Crime Reporting and Investigative Interviewing System.

Grover, V., Adderley, R., & Bramer, M. (2007). Review of current crime prediction

Techniques. In Applications and Innovations in Intelligent Systems XIV (pp. 233-

237). Springer, London.

Almanie, T., Mirza, R., & Lor, E. (2015). Crime prediction based on crime types and using

spatial and temporal criminal hotspots. arXiv preprint arXiv:1508.02050.

Jakkhupan, W., & Klaypaksee, P. (2014, August). A web-based criminal record system

using mobile device: A case study of Hat Yai municipality. In Wireless and

Mobile, 2014 IEEE Asia Pacific Conference on (pp. 243-246). IEEE.

Jaiswal, A., Gunjal, N., Londhe, P., Singh, S., & Solanki, R. (2013, October) Crime

Automation & Reporting System. International Journal of Science and Modern

Engineering (IJISME) ISSN, 2319-6386.

Jain, N., Agarwal, S., Joshi, G., Gupta, R., & Kataria, A. (2017). Crime File System.

Levitt, S. D. (1998). The relationship between crime reporting and police: Implications

for the use of Uniform Crime Reports. Journal of Quantitative Criminology, 14(1), 61-81.

Grover, V., Adderley, R., & Bramer, M. (2007). Review of current crime predictions

techniques In Applications and Innovations in Intelligent System XIV (pp. 233-237).

Springer, London.

38
Osawe, Cyril Onyepuemu. (2015). Increase Wave of Violent Crime and Insecurity:

A Threat to Socio-Economic Development in Nigeria. IOSR Journal of Humanities

And Social Science (IOSR-JHSS) 20 Issue1, Ver. IV: 123-133.

Levitt, S. D. (1998). The relationship between crime reporting and police:

Implications for the use of Uniform Crime Reports. Journal of Quantitative

Criminology, 14(1), 61-81.

Grover, V., Adderley, R., & Bramer, M. (2007). Review of current crime prediction

techniques. In Applications and Innovations in Intelligent Systems XIV (pp. 233-

237). Springer, London.

Osawe, Cyril Onyepuemu. (2015). Increase Wave of Violent Crime and Insecurity: A

Threat to Socio-Economic Development in Nigeria. IOSR Journal of Humanities

And Social Science (IOSR-JHSS) 20 Issue1, Ver. IV: 123-133.

Kabia, V. S. (2016). The Relationship between Increased Police Patrols and Violent

Crime Rates in Seven United States Cities.

Levitt, S. D. (1998). The relationship between crime reporting and police:

Implications for the use of Uniform Crime Reports. Journal of Quantitative

Criminology, 14(1), 61-81.

Ugwuishiwu, C. H., Ugwu, K. C., & Inyiamah, H. C. (2013). Design and Implementation

of Real-Time Crime Information System for National Drug Law Enforcement

Agency (NDLEA) in Nigeria. African Journal of Computing & ICT, 6(2).

Moore, M. H., & Trojanowicz, R. C. (1988). Corporate strategies for policing (No. 6). US

Department of Justice, Office of Justice Programs, National Institute of Justice.

Awodele, O., Onuiri Ernest, E., Olaore Olufunmike, A., & Anita, S. O. O. U. E. (2015).

39
A Real-Time Crime Records Management System for National Security

Agencies. European Journal of Computer Science and Information

Technology, 3(2), 1-12.

R. G. Jimoh, K.T. Ojulari, & O.A. Enikuomehin (2014). A Scalable Online Crime

Reporting System, African Journal of Computing & ICTs. Vol 7, No. 1. Pp11-20.

R. G. Jimoh, K.T. Ojulari, & O.A. Enikuomehin (2014). A Scalable Online Crime

Reporting System, African Journal of Computing & ICTs. Vol 7, No. 1. Pp11-20.

Jansson, K. (2005). Volume crime investigations: a review of the research literature.

Home Office.

Ugwuishiwu, C. H., Ugwu, K. C., & Inyiamah, H. C. (2013). Design and Implementation

of Real-Time Crime Information System for National Drug Law Enforcement

Agency (NDLEA) in Nigeria. African Journal of Computing & ICT, 6(2).

Ugwuishiwu, C. H., Ugwu, K. C., & Inyiamah, H. C. (2013). Design and Implementation

of Real-Time Crime Information System for National Drug Law Enforcement

Agency (NDLEA) in Nigeria. African Journal of Computing & ICT, 6(2).

Raza, S. M., & Rajamanickam, L. (2015). A Proposed Solution for Crime Reporting and

Crime Updates on Maps in Android Mobile Application. International Journal of

Computer Applications, 975, 8887.

40

Вам также может понравиться