DESIGN AND
IMPLEMENTATION OF A COMPUTERIZED SECURITY INFORMATION SYSTEM
(A CASE
STUDY OF NIGERIA POLICE FORCE)
TABLE
OF CONTENTS
Cover
page
Title
page
Certification
Dedication
Acknowledgement
Abstract
Organization
of the work
Table
of contents
Introduction
1.1
Background
of the study
1.2
Statement
of problem
1.3
Purpose
of study
1.4
Scope of
study
1.5
Limitations
1.6
Assumption
1.7
Definition
of terms
CHAPTER
ONE
INTRODUCTION
1.1
BACKGROUND
OF STUDY
Information system occupies a vital and
unique position in any organization by virtue of the data and information,
which it contains. Security of information is of great importance to any given
organization this makes the information reliable since information stored can
be referenced whenever necessary access by unauthorized persons.
This project analysis the activities and
importance of securing information in any organizations and to see that the
information is accurately maintained to help the management in decision making
and control of the diverse activities of the organization.
The Nigeria police force is responsible for
security of live and property and as a result keeps record of vital information
given to them by any informant so as to enable them arrest activities or scenes
unpleasant to people residing in a particular district.
Therefore, for effective administration and
management, the provision of computer based information security for every
source station is certainly inevitable, since it will take care of all the
problems and inadequacies of the manual system.
1.2
STATEMENT
OF THE PROBLEM
Inspite of the level of computation of
various organizations, this particular organization on discussion is still at
the grass root level. It requires a certain degree of protection especially of
vital equipments, properties and information and this cannot be realized
through the current system of operation, which is the manual system.
1.3
PURPOSE
OF THE STUDY
The purpose of this study is to provide a
computer based, on line and interactive package that will accurately and
efficiently record all data and information about staff, informers, witnesses
and accused persons.
It will also eradicate the numerous problems
associated with the manual technique of securing information in order to
facilitate the transfer and retrieval of information between the various
departments of the organization,
1.4
AIMS
AND OBJECTIVES
Having studied the activities of the police
station some benefits could be derived from the computerization of information
system and this includes:
1.
Higher
security efficiency of information
2.
Quicker
access to individual data
3.
Faster
treatment of information security oriented cases.
4.
Provision
of output information in a readily comprehensible form to those persons
involved in the activities of the organization. Provision of communication channels.
To compass formal and informal component.
To provide storage facilities
for data not immediately required or that may be required to be used more than
once.
1.5
THE
SCOPE OF THE STUDY
The scope of this study is to eradicate the
numerous problems associated with the manual technique of securing information
in order to facilitate the retrieval of information.
1.6
LIMITATIONS
A lot of militating constraints were
encountered during the course of this write up. They are:-
Inaccessibility to some documents, which
arose due to security, imposed on some of the organization documents by the
management. It was not also possible to make an in-dept study of these
documents, which would have helped in the development of the project work..
Time was a major limitation to this write up,
there wasn’t enough time to study the details of the various field of the
information department of the organization unavailability of textbook needed
for this write – up was not found in the institution library.
1.7
ASSUMPTIONS
For easy implementation of this study some
assumption were made.
It is assumed that the software to be
designed for the study will help police stations in the effective storage of
vital information.
Finally, it is also assumed that by
computerizing this organization, information security has been implemented to
handle their day to day cases in a better and more organized manner.
1.8
DEFINITION
OF TERMS
Q
– Basic - The programming language used in designing the project program
Modules - This
is the act of partitioning software’s logically into elements that performs
specific functions and sub functions.
On-line
processing - This is a method of
processing that provides direct access to information files used by user’s and
so enables updating.
Operations
– The action carried out on an activity or process.
Crime
record sheet – This contains pertinent information on staff and services as
input to the computer system via the standard input deice keyboard
Data
entry – This is the standard input device through which the system gets most of
the instructions and commands.
Old
file – This contains previous information on the staff and crime record and is
updated each time on operation is carried out.
Display
unit – An output device where systems display mosts outputs on request.
New
file – This is an update of the old file and is stored on line in the system
hard disk or a floppy diskette.
Storage
unit – This is where files are stored and retrieved when needed, it could be
the hard – disk, floppy disk, drums e.t.c.
Processing
unit – This is where all data are processed and commands from the user carried
out.
Password
– This is being employed to restrict unauthorized access to information
contained in the system; in others it is a security check technique
Witness
– This is a person who has actually present at an event and should for these
reason be able to describe it.
Accused
– This is a person who has done wrong by breaking the law. Information or
informers – This is a person who detects offenders and informs the authorities
of their offences
Suspect
– This is when one have a feeling that someone is guilty.
Search
warrant – This is an official authority given to policemen when it is necessary
to enter and search a building for any stolen property.
Exhibit
– This is a document produced in a law court and referred to in evidence.
Conviction
– This is the act of convicting a person for crime.
Ibrahim, Q. (2018). Design and implementation of a computerized security information system. Afribary. Retrieved from https://track.afribary.com/works/design-and-implementation-of-a-computerized-security-information-system-7486
Ibrahim, Qosim "Design and implementation of a computerized security information system" Afribary. Afribary, 29 Jan. 2018, https://track.afribary.com/works/design-and-implementation-of-a-computerized-security-information-system-7486. Accessed 19 Nov. 2024.
Ibrahim, Qosim . "Design and implementation of a computerized security information system". Afribary, Afribary, 29 Jan. 2018. Web. 19 Nov. 2024. < https://track.afribary.com/works/design-and-implementation-of-a-computerized-security-information-system-7486 >.
Ibrahim, Qosim . "Design and implementation of a computerized security information system" Afribary (2018). Accessed November 19, 2024. https://track.afribary.com/works/design-and-implementation-of-a-computerized-security-information-system-7486