Our Archives

Call 08068929770 or 08122972656 for any enquiries.

Project Topic:

Design And Implementation Of A Computerized Security Information System (A Case Study Of Nigeria Police Force)

Project Information:

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 65 ::   Attributes: source code ::   2,448 people found this useful

Project Body:

ABSTRACT

Security of life and property is an essential need of an individual as well as a generate body. This calls for the need for a well-organized information security system.s

Before the advent of computers, there was no security of vital information’s, files where pulled out from  cabinets from sections, which might result to misplacement of individual files, and documents as a result this project was implemented.

This project emphasis on information which is produced in a way understandable by man and the need to store this information so that need to store this information so that it can be referenced when necessary, it also describes how all these could be done electronically. It shows how information could be stored, modified and recalled instantly and accurately through computerization with out access by authorized persons.

 

 

 

 

ORGANIZATION OF WORK

This work is divided into four sections namely the preliminaries, the chapters, the bibliography and the appendices. The preliminaries, the abstracts, dedications, acknowledgement, table of contents and the list of appendices.

The chapters were divided into seven, chapter one treats the problem and its setting. This includes the statement of the problems, purpose of the study, aims and objectives, scope and delimitation, limitations and constraint assumptions and defection of terms.

Chapter two treats the review of related literature which includes introduction, and a brief description of our police services.

Chapter three treats the description and analysis of the existing system, organization chart, information flow diagram.

Chapter four treats the design of the new system which involves the procedure, chart, file design, system flowchart and system requirement.

Chapter five of this study discusses the implementation of the new system.

Chapter six discusses the documentation of the new system.

Chapter seven summaries the entire work in a nutshell bringing into view its recommendation for future study.

The bibliography entitle the author’s name and books consulted during the course of the study.

Finally, the appendices comprises the program used to test the thesis.

 

 

 

 

 

 

 

 

 

 

 

 

 

TABLE OF CONTENTS

Cover page

Title page

Certification

Dedication

Acknowledgement

Abstract

Organization of the work

Table of contents

          CHAPTER ONE

Introduction

  1. Background of the study
  2. Statement of problem
  3. Purpose of study
  4. Scope of study
  5. Limitations
  6. Assumption
  7. Definition of terms

 

CHAPTER TWO

          Literature review

          CHAPTER THREE

Descriptions and analysis of the existing system

  1. General description of the existing system
  2. Methods of fact finding used
  3. The organizational structure
  4. Objectives of the existing system
  5. Input, process, and output analysis
  6. Information flow diagram
  7. Problem of the existing system
  8. Justification for the new system

 

CHAPTER FOUR

          Design of the new system

  1. Output specifications and design
  2. Input specifications and design
  3. File design
  4. Procedure chart
  5. System flowchart
  6. System requirements

 

CHAPTER FIVE

          Implementation

  1. Program design
  2. Program flow chart
  3. Psendocodes
  4. Sources programs
  5. Test run

 

CHAPTER SIX

          Documentation

  1. System documentation
  2. Program documentation
  3. User documentation

CHAPTER SEVEN

          Conclusion and Recommendation

  1. Conclusion
  2. Recommendation

Bibliography

 

CHAPTER ONE

INTRODUCTION

  1. BACKGROUND OF STUDY

Information system occupies a vital and unique position in any organization by virtue of the data and information, which it contains. Security of information is of great importance to any given organization this makes the information reliable since information stored can be referenced whenever necessary access by unauthorized persons.

This project analysis the activities and importance of securing information in any organizations and to see that the information is accurately maintained to help the management in decision making and control of the diverse activities of the organization.

The Nigeria police force is responsible for security of live and property and as a result keeps record of vital information given to them by any informant so as to enable them arrest activities or scenes unpleasant to people residing in a particular district.

Therefore, for effective administration and management, the provision of computer based information security for every source station is certainly inevitable, since it will take care of all the problems and inadequacies of the manual system.

 

 

  1. STATEMENT OF THE PROBLEM

Inspite of the level of computation of various organizations, this particular organization on discussion is still at the grass root level. It requires a certain degree of protection especially of vital equipments, properties and information and this cannot be realized through the current system of operation, which is the manual system.

 

  1. PURPOSE OF THE STUDY

The purpose of this study is to provide a computer based, on line and interactive package that will accurately and efficiently record all data and information about staff, informers, witnesses and accused persons.

It will also eradicate the numerous problems associated with the manual technique of securing information in order to facilitate the transfer and retrieval of information between the various departments of the organization,

 

 

  1. AIMS AND OBJECTIVES

Having studied the activities of the police station some benefits could be derived from the computerization of information system and this includes:

  1. Higher security efficiency of information
  2. Quicker access to individual data
  3. Faster treatment of information security oriented cases.
  4. Provision of output information in a readily comprehensible form to those persons involved in the activities of the organization. Provision of communication channels. To compass formal and informal component.

To provide storage facilities for data not immediately required or that may be required to be used more than once.

 

  1. THE SCOPE OF THE STUDY

The scope of this study is to eradicate the numerous problems associated with the manual technique of securing information in order to facilitate the retrieval of information.

 

  1. LIMITATIONS

A lot of militating constraints were encountered during the course of this write up. They are:-

Inaccessibility to some documents, which arose due to security, imposed on some of the organization documents by the management. It was not also possible to make an in-dept study of these documents, which would have helped in the development of the project work..

Time was a major limitation to this write up, there wasn’t enough time to study the details of the various field of the information department of the organization unavailability of textbook needed for this write – up was not found in the institution library.

 

  1. ASSUMPTIONS

For easy implementation of this study some assumption were made.

It is assumed that the software to be designed for the study will help police stations in the effective storage of vital information.

Finally, it is also assumed that by computerizing this organization, information security has been implemented to handle their day to day cases in a better and more organized manner.

 

  1. DEFINITION OF TERMS

Q – Basic    -        The programming language used in designing the project program

Modules      -        This is the act of partitioning software’s logically into elements that performs specific functions and sub functions.

On-line processing         - This is a method of processing that provides direct access to information files used by user’s and so enables updating.

Operations – The action carried out on an activity or process.

Crime record sheet – This contains pertinent information on staff and services as input to the computer system via the standard input deice keyboard

Data entry – This is the standard input device through which the system gets most of the instructions and commands.

Old file – This contains previous information on the staff and crime record and is updated each time on operation is carried out.

Display unit – An output device where systems display mosts outputs on request.

New file – This is an update of the old file and is stored on line in the system hard disk or a floppy diskette.

Storage unit – This is where files are stored and retrieved when needed, it could be the hard – disk, floppy disk, drums e..t.c.

Processing unit – This is where all data are processed and commands from the user carried out.

Password – This is being employed to restrict unauthorized access to information contained in the system; in others it is a security check technique

Witness – This is a person who has actually present at an event and should for these reason be able to describe it.

Accused – This is a person who has done wrong by breaking the law. Information or informers – This is a person who detects offenders and informs the authorities of their offences

Suspect – This is when one have a feeling that someone is guilty.

Search warrant – This is an official authority given to policemen when it is necessary to enter and search a building for any stolen property.

Exhibit – This is a document produced in a law court and referred to in evidence.

Conviction – This is the act of convicting a person for crime.


Get The Complete Project »

Project Department:

MORE COMPUTER SCIENCE FREE UNDERGRADUATE PROJECT TOPICS AND RESEARCH MATERIALS

Instantly Share this Project On Social Media:

CLOSELY RELATED COMPUTER SCIENCE FREE UNDERGRADUATE PROJECT TOPICS AND RESEARCH MATERIALS

A SURVEY OF DATA BASE MANAGEMENT IN ENHANCING THE WORK PERFORMANCE OF OTM GRADUATES IN SELECTED ORGANISATIONS IN ABUJA

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 61 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   3990 engagements

CHAPTER ONE 1.1. BACKGROUND OF THE STUDY A database is an organized collection of data.[1] It is the collection of schemes, tables, queries, reports, views and other objects. The data is typically o...Continue reading »

A STUDY INTO THE CHALLENGES AND PROSPECTS OF MARKETING NIGERIAN MADE COMPUTER SOFTWARES

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 65 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   5366 engagements

CHAPTER ONE 1.1. Background to the Study Made-in-Nigeria softwares are those that are produced within Nigeria. Nigeria as a third world country needs to produce its own software so that it will help...Continue reading »

AN APPRAISAL OF THE ROLE OF ICT AS A CHANGE AGENT FOR QUALITY EDUCATION IN TERTIARY INSTITUTION IN NIGERIA

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 64 ::   Attributes: Questionnaire, Data Analysis,Abstract

CHAPTER ONE INTRODUCTION 1.1. BACKGROUND OF THE STUDY Quality assurance in the education system is a concept consisting of lot of activities that are designed to improve the quality of input, proce...Continue reading »

ASSESSMENT OF THE UTILIZATION OF INTERNET SERVICES AMONG STUDENTS IN FEDERAL INSTITUTIONS IN KADUNA STATE

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 69 ::   Attributes: Questionnaire, Data Analysis,Abstract  ::   4485 engagements

CHAPTER ONE INTRODUCTION The convergence of information and communication technologies as typified by the Internet is increasingly having more influence on all aspects of the society as it has becom...Continue reading »

AUTOMATED DATA ANALYSIS OF LABORATORY TEST RESULTS AND ITS SCIENTIFIC IMPORTANCE

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 59 ::   Attributes: Sort code, Abstract  ::   3072 engagements

CHAPTER ONE 1.1. Introduction As an authentic measure to curb mortality rate, it is important to know the diseases that contribute to increasing mortality rate. Laboratory test results provide inform...Continue reading »

AUTOMATED MARKET BASKET ANALYSIS SYSTEM

 Format: MS WORD ::   Chapters: 1-5 ::   Pages: 65 ::   Attributes: Sort code, Abstract  ::   2981 engagements

CHAPTER ONE 1.0 INTRODUCTION Data mining is described as the extraction of hidden helpful information from a collection of huge databases, data mining is also a technique that encompasses an enormou...Continue reading »

What are you looking for today?

TESTIMONIALS:

  • 1. Mohammed A.B from Veterinary Laboratory, Zanzibar ,Tanzania said "You are doing good job to assists in research. God bless you.".
    Rating: Very Good
  • 2. Grace Madu from IMT enugu said "Thank you so much; i will tell my friends about you guys!!! Please give them a good job just like mine!!! God bless you!!!".
    Rating: Excellent
  • 3. Favour Adeoti from Unimaid said "For the good deeds and help to students like me, may God almighty continue to bless u and empower you to do more. Thank u very much...".
    Rating: Excellent
  • 4. Saddiq Abubakar Shuaibu from ESAE BENIN UNIVERSITY said "I check your site because I want you to help do this project thank you".
    Rating: Excellent
  • 5. Temitope Olumide from UAM makurdi said "I can not believe i could trust online platforms but you prove to me that there are still some good people out there. Thank you Mr Donald".
    Rating: Excellent
  • 6. Topeola Atinuke from the bells said "hmmmm, not sure yet about all dis comment still working on dem yet....tank u".
    Rating: Average

Paper Information

Format:ms word
Chapter:1-5
Pages:65
Attribute:source code
Price:₦3,000
Get The Complete Project »

Best Selling Projects

Our Archives