Abstract
An ideal society is governed by laws and measurable consequences are meted out to any member of the society that is found guilty of law breaking. Customarily, members of the society are expected to report any incidence of breakdown of law and order to the appropriate law enforcement authorities. In time past, the process of reporting crimes in the society (Nigeria) had involved going into any of the offices of the law enforcement agencies (e.g. Police, neighborhood corps) to make a report, which made anonymity next to impossible. But the advent of technology opened more avenues for reporting crimes; from telegraph, special radio communication, and dedicated phone lines to a more responsive and more pervasive technological application platforms (web and mobile software applications).
This project develops an all-encompassing web platform that reports all manners of crimes, open to all members of the public, suggestive (search for entities), interpretative and enlightening. It also provides anonymity while reporting crime, for those who desire
Table of Contents
Certification……………………………………………………………………………………….ii Dedication…………………………………………………………………………………….….iii Acknowledgment…………………………………………………………………………….…..iv Abstract……………………………………………………………………………………….…..v Chapter One…………………………………………………………………………………………………………………..1 Introduction……………………………………………………………………………………………………………………1
1.1 Background of Study……………………………………………………………………………………………………..1
1.2 Statement of Problem……………………………………………………………………………………………………3
1.3 Aims and Objectives of Study………………………………………………………………………………………..3
1.4 Scope of Work………………………………………………………………………………………………….,………….3
1.5 Project Development Methodology (Agile Software Methodology)………………………………….4
1.6 Motivation…………………………………………………………………………………………………………………….5
1.7 Project Outline……………………………………………………………………………………………………………..5 Chapter Two……………………………………………………………………………………………………………………………….6
Literature Review……………………………………………………………………………………………………………………….6
2.1 Crime……………………………………………………………………………………………………………………………6
2.1 Types of Crimes…………………………………………………………………………………………………………. 11
2.1.1 Normal Crime……………………………………………………………………………………………………………..11
2.1.2 Political- economic Crime……………………………………………………………………………………………11
2.1.3 Riotous Crime…………………………………………………………………………………………………………….12
2.2 Factors Leading to Crime……………………………………………………………………………………………13
2.2.1 Ordinary Factors………………………………………………………………………………………………………..14
2.2.1.1 Geographical………………………………………………………………………………………………………………14
2.2.1.2 Sociological…………………………………………………………………………………………………………………14
2.2.1.3 Physiological And Atmospheric……………………………………………………………………………………14
2.2.2 Specific Factors…………………………………………………………………………………………………………..15
2.2.2.1 Family Circumstances………………………………………………………………………………………………..15
2.2.2.2 A Ruined Family………………………………………………………………………………………………………..15
2.2.2.3 The Size of the Family………………………………………………………………………………………………..15
2.2.2.4 Discontentedness in the Family……………………………………………………………………………………15
2.2.2.5 Fallen Family……………………………………………………………………………………………………………..16
2.2.2.6 Absence of Orderliness in the Family………………………………………………………………………….16
2.4.2.7 The Movies………………………………………………………………………………………………………………….16
2.4.2.8 Financial Conditions…………………………………………………………………………………………………..16
2.4.2.9 Regional Variance………………………………………………………………………………………………………17
2.4.2.10 Religious Radicalism……………………………………………………………………………………………………18
2.5 Electronic Crime Reporting Platforms………………………………………………………………………..18
2.6 Limitations of Existing E-Crime Reporting Platforms…………………………………………………19
2.7 Justice System In Nigeria……………………………………………………………………………………………19
Chapter Three…………………………………………………………………………………………………………………………..20
System Analysis ………………………………………………………………………………………………………………………..20
3.1 Requirement Discovery……………………………………………………………………………………………….20
3.1.1 Problem Analysis………………………………………………………………………………………………………..20
3.1.2 Fact Finding………………………………………………………………………………………………………………..20
3.2 System Requirements Modeling…………………………………………………………………………………..21
3.2.1 Business Actors……………………………………………………………………………………………………………21
3.2.2 Business Requirements Use Cases………………………………………………………………………………..21
3.2.3 Use Case Model Diagram…………………………………………………………………………………………….23
3.2.4 Use Case Dependencies………………………………………………………………………………………………..26
3.3 Data Modeling and Analysis………………………………………………………………………………………..27
3.3.1 Entity Discovery………………………………………………………………………………………………………….27
3.3.2 Context Data Model…………………………………………………………………………………………………….28
3.3.3 Key Based Data Model………………………………………………………………………………………………..29
3.3.4 Fully Attributed Data Model………………………………………………………………………………………….31
3.3.5 Class Diagrams………………………………………………………………………………………………………………31
3.3.6 Activity Diagram……………………………………………………………………………………………………………31 Chapter Four…………………………………………………………………………………………………………………………….33
System Design……………………………………………………………………………………………………………………………33
4.1 Application Architecture………………………………………………………………………………………………..33
4.1.1 Network Architecture…………………………………………………………………………………………………….33
4.1.2 Person-Machine Boundaries…………………………………………………………………………………………..34
4.2 System Database…………………………………………………………………………………………………………….34
4.2.1 Database Schema…………………………………………………………………………………………………………..34
4.3 System Interfaces…………………………………………………………………………………………………………..36
4.3.1 Input Interfaces……………………………………………………………………………………………………………..36
4.3.2 Output Interfaces…………………………………………………………………………………………………………..38
Chapter Five……………………………………………………………………………………………………………………………..39
System Implementation and Evaluation……………………………………………………………………………………..39
5.1 Implementation……………………………………………………………………………………………………………..39
5.1.1 Programming Tools……………………………………………………………………………………………………….39
5.1.2 Hardware Requirements………………………………………………………………………………………………..40
5.1.3 Software Platform………………………………………………………………………………………………………….40
5.2 System Deployment………………………………………………………………………………………………………..40
5.3 Evaluation……………………………………………………………………………………………………………………..41
Chapter Six……………………………………………………………………………………………………………………………….46
Conclusion…………………………………………………………………………………………………………………………………46
6.1 Achievements…………………………………………………………………………………………………………………46
6.2 Limitation and Constraints…………………………………………………………………………………………….46
6.3 Recommendations and Future Works…………………………………………………………………………….47
7.0 References………………………………………………………………………………………………………………………48
List of Figures
Figure 1: Interaction between an Anonymous User and the application……………xxxii Figure 2: Interaction between a registered user and the application……………….xxxiii Figure 3: Interaction between a Security Agency and the application………………xxxiv Figure 4: Interaction between a Super Admin and the application……………………xxxv Figure 5: Context Data Model for the business actors…………………………………..xxxvii Figure 6: Database objects and Data Keys…………………………………………………xxxviii Figure 7: The annotated Class diagram for the E-Crime Platform………………………..xli Figure 8: Activity diagram for the Proposed E-Crime Platform……………………………xlii Figure 9: The architecture for the proposed E-Crime Application……………………….xliii
Figure 10: The Network Architecture for the proposed solution…………………………xliii Figure 11: The landing page…………………………………………………………………………xlvi Figure 12: The Report querying page……………………………………………………………xlvii
Figure 13: The Login form for registered users……………………………………………….xlvii Figure 14: A View for a Registered Regular User……………………………………………xlviii Figure 15: Crime Indexes Based on Context (1)………………………………………………….li Figure 16: Crime Indexes Based on Context (2)…………………………………………………lii Figure 17: A View for a Registered Regular User……………………………………………….liii Figure 18: An Army Administrator Writing a Progress Note to an Incident…………….liv
Figure 19: A View for a Registered Regular User with Feedback…………………………..lv
List of Tables
Table 1: Crimes committed in States, by number of incidents and fatalities (Adapted
from Ukoji et.al (2016)).……………………………………………………………………………..xviii
Table 2: Crimes fatalities in Nigeria between June 2006 – September 2015(Adapted
from Ukoji et.al (2016)).……………………………………………………………………………….xix Table 3: Use case statement for an Anonymous User……………………………………..xxxi
Table 4: Use case statement for a Registered User…………………………………………xxxi Table 5: Use case statement for a Super Admin…………………………………………….xxxii
Table 6: Use case statement for a Security Agency……………………………………….xxxii Table 7: Use case dependencies for the business actors……………………………….xxxvii Table 8: Setup Category table…………………………………………………………………………xl
Table 9: General Setup table…………………………………………………………………………..xl
Table 10: User table………………………………………………………………………………………xl
Table 11: Incident table………………………………………………………………………………….xl Table 12: Role Access table……………………………………………………………………………xli Table 13: Actors-Machine Boundaries……………………………………………………………xliv Table 14: A Schema for SetupCategory table…………………………………………………..xlv
Table 15: Schema for General Setup table………………………………………………………xlv Table 16: A Schema for User table…………………………………………………………………xlv Table 17: A Schema for Incident table……………………………………………………………xlvi
Table 18: A Schema for Role Access table……………………………………………………..xlvi
Chapter One
Introduction
1.1 Background of Study
The quest to control crime and breakdown of law and order increases has the society grows and diversity of human intentions and interactions abound. An ideal society is governed by laws and regulations that are collectively agreed upon and measurable consequences that will be meted out for any member of the society that is found culpable to have floated any specific component of the legal infrastructure.
Besides the legal infrastructure in a society are the security apparatuses that enforce the law with the interest to maintain law and order. The legal infrastructures determine the extent to which law enforcement agents can act or protect the common interests of individuals in the society. It also outlines the civic responsibilities and human rights for the members of the society.
Customarily, members of the society are supposed to report any incidence of breakdown of law and order to the appropriate civil and military security apparatuses. Reported cases are also supposed to be intelligently collected, evaluated and investigated to a more conclusive and justifiable end. Evidences are collected, protected and properly examined before accused persons are charged to Law court and fairly prosecuted. Investigations are carried out without fear or favour. In fact, any attempt to prevent due process during crime investigation is in itself a crime and it is also punishable under the law.
Until recently, the process of reporting and investigating crimes in the society has been mainly manual. Individuals who have some complaints will work into any offices of the security agents (e.g. Police, neighborhood corps) to inform and write in statement issues that may need their attention. At these offices, the security agents will raise an incidence form and ask the reporter to fill some appropriate segments. The security agents will also ask some intelligent questions from the reporter and make notes of preliminary investigations. Evidences suggested will be noted and further investigations will be followed up and new evidences will be collected, evaluated and protected.
The advent of technology has opened new fronts of opportunities of leveraging on the diverse benefits of information technology to crime reporting. There are various technology platforms that have been developed to assist how crime incidences are reported, responded to and investigated. The technological applications have gone from telegraph, special radio communication, and dedicated phone lines to a more responsive and more pervasive technological application platforms (web and mobile software applications). Majority of the members of the society nowadays have mobile devices that can easily access the internet. This makes the web approach the most economical and open approach for reporting crime with a far reaching benefits and coverage. Although there are several efforts that have been made in this area around the world, there is still no popular and responsive platform for reporting crime in Nigeria. The few available platforms in Nigeria (e.g. Amebo, Linda Ikeji) are blogs and are not ultimately serving the goal of properly reporting, evaluating and investigating various crimes in Nigeria. A close thing to it is the respective platforms sponsored by Economic Financial Crime Commission (EFFC) and Investigation of Crime and Corrupt practices (ICPC); they provide avenues to report crime incidences but investigation and response are towards financial crimes. This platform does not include murder, battery or harassment incidences which are commonly reported at the local Police station than financial crimes reported at EFFC and ICPC combined. These institutions and their respective platforms are specialized in the area of financial crime and their activities are so secretive that processes and progress of investigations are not shared with other security agencies and the members of the public.
The available platforms are far below how technology could be harnessed to report crimes. The platforms are not popular and not very intuitive to use by common citizens. The platforms are unidirectional in the sense they do not have feedback for the members of the society. All these gaps have necessitated our interests for an ideal application that will address the limitations.
We are looking forward to developing an all-encompassing web platform that reports all manners of crimes, open to all members of the public, suggestive (search for entities), interpretative and enlightening. The platform will provide a platform for various security agencies to share and gather evidences and mobilize members of the public for certain interests that will drive better policing, crime prevention and investigation.
We hope this project will address the gaps identified in the information space of crime reporting and investigation in Nigeria.
1.2 Statement of Problem
The notable crime reporting platforms are lopsided and not intuitive. The process of reporting crimes to security agencies still remain very difficult. The platforms are also unidirectional in the sense that they do not have feedbacks for the members of the society. The existing platforms do not support sharing of relevant information with other security agencies, thereby because owners of these platforms wants to take all the praise; while in actual fact security is being reinforced when meaningful and relevant information is shared among security stakeholders towards offering an excellent service. All these make our justice system questionable and irresponsible.
We propose an all-encompassing platform that will practically address ego issues among security agencies, give feedbacks and strengthen the overall security service and existing security apparatuses.
1.3 Aims and Objectives of Study
To develop a web application that demonstrates that the process of reporting, evaluating and investigating crimes in Nigeria should not be tortuous and that the model can be adopted for designing newer crime reporting platforms.
Our objective is to propose a system that caters for reporting all kinds of crimes, gives feedback and sustain the process of crime investigation and correction.
1.4 Scope of Work
We will design a web application that will provide a platform to report all manners of crimes. We will also provide a platform for different security agencies and their representatives to be registered; with a dashboard to view and interpret different report incidences. The general public will also be able to freely report, get feedback and evaluate progress of reported cases without fear or intimidation. The application will be data driven and user experience will be responsive and consistent.
The applications will be accessible over the internet on computers and other mobile devices. No other hardware resources will be required and the evaluation will be mainly experimental.
1.5 Project Development Methodology (Agile Software Methodology)
Agile-Scrum Software Model
Agile software methodology is a set of repetitive and incremental process models. It is considered to be most flexible and easily maneuverable for skittish requirement specifications environments. Unlike other process models where high formality is required and the specifications are expected to be known and verified before the commencement of design, Agile models allow the use of increments or possible prototypes that can evolve into a more suited and validated requirements and eventually software application. Pressman (2004) defines it as a development pattern that encourages customer satisfaction and early incremental delivery of operational software; small, highly motivated project teams; informal methods; minimal software engineering work products; and overall development simplicity.
There are several evolving Agile process models for different design scenarios which are considered flexible, incremental and repetitive in approach. For this project, we would be using SCRUM Agile process model because of its support for object oriented software design. Pressman (2004) noted that Agile process models are not completely independent of the traditional process models; in fact most of the Agile models are flexible derivations or variations of the traditional approach.
SCRUM Process Model
It is an Agile process model which follows these activities: requirements, analysis, design, evolution and delivery. Scrum emphasizes the use of a set of software process patterns that have been proven effective for projects with tight timelines, changing requirements and business criticality. A prioritized list of project requirements or features that provide business value for the customer is made and it’s called Backlog, work units that are required to achieve a requirement defined in the backlog that must be fit into a predefined time-box are also made and it’s called Sprints. Short meetings held daily by the scrum team would also be conducted, a team leader also called the scrum master who leads the meeting and assesses the responses from each person. Demos are also done; which is a software increment to the customers so that functionality that has been implemented can be demonstrated and evaluated by the customer.
1.6 Motivation
The new campaign aimed at fighting corruption and sharp practices in Nigeria has been our motivation. We want to demonstrate an ideal model that can be adopted to assist crime reporting and create a healthy thinking and attitudes among Nigerians.
1.7 Project Outline
Chapter two is dedicated to literature review on successful models for crime reporting platforms. Chapter three contains the research methodology and other software artifacts for the proposed model. Chapter four is dedicated to the technical implementations of the methodologies outlined in chapter three and chapter five is the conclusion and recommendation for future works.
DISCLAIMER: All project works, files and documents posted on this website, eProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. eProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. The paid subscription on eProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.