Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Chapter Two: Almanie Et Al., 2015

You are on page 1of 17

CHAPTER TWO

LITERATURE REVIEW

In this section, we analyze systems that are akin to the proposed system. We will focus on

the systems that are closest in functionality to the CRMS, highlighting their key features,

similarities, history, relationship b/w crime and police, advantages and disadvantages and

existing system.

2.0 INTRODUCTION

Crimes are a typical social issue influencing the personal satisfaction and the monetary

development of a general public. In spite of the fact that wrongdoings could happen all

over, usually offenders chip away at wrongdoing openings they face in most natural regions

for them, by giving an information mining way to deal with decide the most criminal

hotspots and discover the sort, area and time of perpetrated violations, we want to raise

individuals' mindfulness in regards to the perilous areas in certain timespans (Almanie et

al., 2015).

Crime Report It can likewise be characterized as the correspondence of data orchestrated

in an exact, succinct, clear and complete way, which at that point turns into a record of an

offered episode to an invested individual for choice to be made. There are numerous sorts

of wrongdoings, lawbreakers and unfortunate casualties. There are not kidding

wrongdoings and little offenses (Jakkhupan, et al., 2014).

Crime Reporting System will address the refered to explanations behind not announcing,

yet in addition the need of police offices for progressively precise, complete, and reusable

data that may save their time and assets to designate them to policing the roads An online

arrangement is valuable as the arrangement is innately distributive. This distributive normal


for the online arrangement helps in getting the diverse police headquarters to share data

and get in contact with each other. It likewise enhances work proficiency of the office.

Utilizing this application data dealing with will be simple and quick and illuminating cases

will be quick (Jaiswal, et al., 2013).

Crime Report System is a system used to report crimes. It very well may be utilized to

report Crime. This venture is primarily valuable for police headquarters. This framework

will deal with every one of the exercises in a police headquarters utilizing PCs. As of now,

every one of the works are done physically, by mechanizing every one of the exercises

inside a police headquarters can be overseen effectively and successfully, This framework

will deal with every one of the exercises in a police headquarters utilizing PCs, It is a critical

thinking movement that requires concentrated correspondence between the framework

clients and framework engineers. The goals of this application is to keep up a mechanized

record of all the F.I.R against wrongdoing (Jain, et al., 2017).

Many researchers trust that revealed wrongdoing information are defiled by estimation

mistake emerging from contrasts in police division detailing rehearses crosswise over

locales, innovative advances in wrongdoing recording, and changes in wrongdoing

announcing by exploited people after some time. Regardless of whether such issues exist,

be that as it may, they don't really block the utilization of revealed wrongdoing

measurements for deciding the adequacy of strategies intended to diminish wrongdoing

(Levitt, et al. 1998).

Lately police powers have been improving their conventional strategy for wrongdoing

revealing with new mechanical progressions to build their yield by effectively recording

violations to help their examination (Adderley and Musgrove 1999). Information isn't only

a record of wrongdoings, and it likewise contains important data that could be utilized to
connect wrongdoing scenes dependent on the usual way of doing things (MO) of the

offender(s), recommend which guilty parties might be in charge of the wrongdoing and

furthermore distinguish those wrongdoers who work in groups (guilty party systems) and

so forth. In this day and age, PCs are assuming a noteworthy job in the examination of a

wide range of wrongdoing from those that are considered as volume wrongdoing (thievery,

vehicle wrongdoing and so on.) to significant wrongdoing, for example, misrepresentation,

medicate dealing, murder, and so on.( Grover, et al. 2007).

2.1 HISTORY OF CRIME REPORTING

The role of computers has been increased in all walks of life from the finance sector to

supermarkets. In recent years police forces have been enhancing their traditional method

of crime reporting with new technological advancements to increase their output by

efficiently recording crimes to aid their investigation (Adderley and Musgrove 1999), Data

is not just a record of crimes, it also contains valuable information that could be used to

link crime scenes based on the modus operandi (MO) of the offender(s), suggest which

offenders may be responsible for the crime and also identify those offenders who work in

teams (offender networks) etc, In today’s world, computers are playing a major role in the

investigation of all types of crime from those that are considered as volume crime (burglary,

vehicle crime, etc.) to major crime such as fraud, drug trafficking, murder etc., It is not an

easy task for a Police analyst to manually unravel the inherent complexities within police

data and this problem is compounded when the analysis is undertaken by a team. The

distribution of the data to the team may cause significant information, which could be

useful to solve the crimes, to be missed as each member is not in possession of all relevant

facts. For a long time, criminologists and statisticians have been applying their skills and

knowledge trying to predict when and where the next set of crimes will occur, with varying
degrees of success. The volume of crime and the greater awareness of modern criminals

put a strain on the existing methods. Human reasoning fails when presented with millions

of records. Therefore, there is clearly a requirement for a tool kit to assist in analyzing the

data which will make the best use of limited resources. (Grover, et al., 2007).

Crime is one of the human security problems confronting humanity across the world.

Nations have grappled to contain the rising incidence of homicide, armed robbery, and

kidnap, drug trafficking, sex trafficking, illegal gun running and host of others, United

Nations Office on Drugs and Crime in 2011 reported that homicides globally were

estimated at 468,000 and more than a third (36%) was estimated to have occurred in Africa,

31% in The Americas, 27% in Asia, 5% in Europe and 1% in the tropical Pacific region 3,

Africa has been on the forefront on global statistics on crime. South Africa and Nigeria

have recorded high incidents of violent and non-violent crimes in recent times. According

to Africa Check, that incidents of murder increased from 15 609 murders in 2011/12 to 16

259 murders in 2012/13 in South Africa, with increase of 650 murder cases or a 4,2%

increase when comparing the total numbers of murders with the previous years5. According

to the same report, murders and attempted murders that take place during aggravated

robbery or inter-group conflict (such as gang or taxi violence), and vigilantism make up

between 35% and 45% of all murders and attempted murders 6. (Osawe, et al., 2015).

Between 1971 and 1975, the United States Department of Justice conducted victimization

surveys in 26 large American cities. Approximately 10,000 household interviews were

conducted in each city. Information was collected on victimization and reporting for a

variety of crimes and is collected in the United States Department of Justice (1975 a, b,

1976) reports. The strength of these data is the availability of city identifiers that can be
linked to the police staffing data collected annually in the FBI's Uniform Crime Reports.

(Levitt, 1998).

The concept of Crime can be viewed as an: illegal act (an action prohibited by Law or

failure to act as required by law); illegal activity that involves breaking the Law; immoral

activity that is considered unacceptable act that is shameful, unwise or regrettable. Crime

by the Law of the Federal republic of Nigeria (FRN, 1999) is defined as „An act or omission

which renders the person doing the act or making the omission liable to punishment under

the criminal code, or any Act or Law” Crime is brought about by the violation of the Law

as established by the government at all levels, Crime is an infraction of both the basic

principles of law and order and the norms of civilized behavior, Crime is an offence against

the value system of a society. The cost and effects of crime vary among the various

segments of the population and touch almost everyone by some degree and in general as

the economic growth and development of countries increase, it would be expected that

crime level reduces, this may not necessarily be. The various cost of crime to victims and

the society or the economy include; loss of income, property losses, loss in community

productivity, etc. Some other cost of crime, which are less tangible; include psychological

trauma on victims and their family and friends, pain and suffering and a lower quality of

life. In all of these and other associated losses, the ultimate cost is loss of life (Osawe, et

al., 2015).

Deterrence Theory and Crime Schelling developed deterrence theory in 1966 as a

preventative military strategy during the Cold War (Paternoster, 2011). The emphasis of

deterrence theory is that punishment serves as a way to minimize and prevent criminal

behaviors (Ritchey & Nicholson-Crotty, 2011; Rizzolli & Stanca, 2012). Deterrence

operates in two ways (a) specifics and (b) generals (Paternoster, 2010; Piquero, Paternoster,
Pograsky, & Loughran, 2011). Specific deterrence pertains to deterring an individual from

committing another crime, whereas general deterrence pertains to punishing an individual

as an example to the general population (Kabia 2016).

Montaldo (2013) said that crime occurs when someone breaks the law by an overt act,

omission or neglect that can result in punishment. A person who has violated a law, or has

breached a rule, is said to have committed a criminal offense. According to National Crime

Prevention Strategy (1996), Crime results in the deprivation of the rights and dignity of

citizens, and poses a threat to peaceful resolution of differences and rightful participation

of all in the democratic process. It inhibits our citizens from communicating with one

another freely, from engaging in economic activity and prevents entrepreneurs and

investors from taking advantage of the opportunities, which our country offers.

Government regards the prevention of crime as a national priority. (Ugwuishiwu, et al.,

2013).

2.2 RELATIONSHIP BETWEEN POLICE AND CRIME

The measure of the police force systematically influences the willingness of exploited people

to report wrongdoing or a police division's affinity authoritatively to record injured individual

wrongdoing reports, at that point UCR information will downplay the genuine adequacy of

police in decreasing wrongdoing. Exploited people might be bound to report violations to the

police when the apparent probability of a wrongdoing being understood is high. Moreover,

the prepared accessibility of a cop at the scene of a wrongdoing may likewise prompt more

wrongdoing reports, and it is anything but difficult to envision that increments in police labor

will influence the probability that native grumblings are authoritatively recorded by police

divisions. On the off chance that detailing/recording inclination (from now on alluded to as

"revealing" predisposition for quickness) is available, announced wrongdoing rates may


increment with the extent of the police constrain, regardless of whether the genuine

exploitation rate is falling. The way that considerably not exactly 50% of all wrongdoings

secured by the FBI's Uniform Crime Reports are really answered to the police uplifts worry

over the significance of announcing inclination. Announcing inclination is often refered to

as a clarification for the inability to reveal a connection between detailed wrongdoings and

police nearness e.g., Greenwood and Wadycki, 1973; Swimmer, 1974; Thaler, 1977, 1978;

CarrHill and Stern, 1979; Cameron, 1988; Devine et al., 1988. (Levitt 1998).

Police Information Management System (PIMS) is a disconnected undertaking that enables

clients to store police office's case subtleties, Complaint Details, First Information Report

(FIR) Details, and so forth. This Software Package permits Police Departments to store every

one of the subtleties identified with the office and use them at whatever point fundamental.

The task reports different cases, FIR report, charge sheet report, Most Wanted Criminals

record, finance, participation reports and furthermore can transfer and view criminal

photographs and filtered archives. The prerequisites for this framework was gathered from

Manglaore Police Station (Ugwuishiwu, et al., 2013).

The center mission of the police is to control wrongdoing. Nobody question this. To be sure,

proficient wrongdoing battling appreciates wide open help as the essential system of policing

definitely in light of the fact that it epitomizes a profound promise to this goal. Interestingly,

other proposed methodologies, for example, critical thinking or network policing show up

superficially to obscure this center.' If these techniques were to leave the network

increasingly helpless against criminal exploitation, they would be unwanted options. In

making a decision about the estimation of elective police systems in controlling wrongdoing,

in hunting down approaches to avoid or control genuine wrongdoing, the police search for

hastening causes. While it might be helpful to analyze what some call the underlying drivers
of wrongdoing (e.g., social unfairness, unequal financial chance, poor tutoring, frail family

structures, or dysfunctional behavior), such things are moderately irrelevant from a police

viewpoint since the police practice little impact over them. The police work on the outside

of public activity. They should deal with episodes, circumstances, and individuals as they are

presently not social orders or individuals as they may have been. Hence, the promptly

hastening reasons for genuine wrongdoing are definitely more vital to the police than are

more extensive inquiries regarding the main drivers of wrongdoing. (Moore, et al., 1998).

2.3 WHAT IS A CRIME?

Crime is a geological. It happens at a particular spot, explicit time and for a particular reason.

It can influence everybody and anybody whenever. Wrongdoings are intricate and

continually evolving. Social and mechanical changes presented new targets, apparatuses and

thought processes in wrongdoing. This online web application for keeping up the best

possible everyday citizens grievances for the police office by utilizing this application

individuals, who are apprehensive or don't have enough time to go the police headquarters

for griping about their own legitimate issues here they can give their protest through online

to record any kind of grumbling. It comprises of grumbling box where the general population

can enroll their grievances. Here clients will have the mindfulness about laws and the

particular disciplines for the wrongdoing (Awodele, et al., 2015).

2.3.1 Crime Management

The event of wrongdoing isn't irregular. It is spatially conveyed in examples a few examples

are found while others are most certainly not. Factor, for example, social class, salary level

and the condition plays parts in the sorts of wrongdoing that are submitted. Assets and

additionally an absence of assets can impact the likelihood of wrongdoings submitted in some

random region. As a result of the intricacy of wrongdoing, wrongdoing must be overseen.


Wrongdoing as different definitions relying upon which viewpoint one is taking a gander at

it from. For this exploration wrongdoing is characterized as "infringement of law or an

occasion of this, deserving of the state." Management, then again, is the way toward

coordinating and controlling the assets of an association such As its staff, materials, and

hardware to accomplish the objectives of the association. Wrongdoing the board is thusly

characterized as controlling, coordinating, and organizing police assets (cash, gear, and

faculty) to keep the infringement of law and where it has been damaged, to secure the culprits

and indict them (Jimoh, R. G. et al, 2014).

2.3.2 Crime Reporting

The past discoveries are enough to persuade readers regarding the significance that

detailing conduct has for the criminal equity framework and the network. Residents,

through the detailing of their wrongdoing encounters begin the criminal equity hardware

which thusly empowers examination of violations by police, the arraignment and

preliminary of guilty parties, and their discipline. The deterrent impact of criminal equity is

potentiated too, then again, non-announcing blocks access to remuneration plans, guilty

parties not being captured, and the objective of an increasingly evenhanded criminal equity

framework being accomplished. Be that as it may, not all the exploitation occurrences are

wrongdoings in a specialized sense, and of those which are, some are minor for sure, the

police will total criminal offense reports in just few these episodes. Expanded readiness to

report what individuals see as violations would result in expanded police endeavors in

managing minor episodes, not all of which may result in attractive results to the people in

question; an issue with possibly pessimistic ramifications for the detailing of maybe

progressively genuine future occurrences. Wrongdoing exploitation is an outflow of social

clash, detailing of apparent exploitation encounters to the police relies on a perplexing

arrangement of variables going from earnestness of episodes to trust in the criminal equity
framework, A progressively total comprehension of non-announcing, its dispersion and its

associates will enable us to evaluate the execution of our criminal equity offices.

2.3.3 Reporting Methods

Effective methods of anonymous reporting include:

• The tip box

• The telephone coupled with an answering machine or voice mail

• E-mail to a central address

• A web site that directs reports to a central address

• Oral reports

The tip box usually consists of several locked boxes at key points around the school or

neighborhood. Each box has a slot for inserting written reports. Boxes need to be located in

Places that are reasonably populated - not deserted and not in the middle of heavy traffic.

The box (and education about using it) should remind students and citizens of what's needed

For a good report - a dated, legible note describing as much as possible what happened where,

when, how and by whom. Advantages of the tip box include low cost, low reliance of

technology and written records. Disadvantages include unreadable reports and limited access.

Tip boxes also require that someone physically visit and collect reports from each of

The boxes.

Telephone reporting systems offer a number of variations.

Some include a toll-free line directed to a cell phone. Some reporting lines are partnered with

a hotline. Calls left on a voicemail or answering machine can be retrieved from anywhere.

The report taker doesn't have to visit boxes. The telephone approach allows students to call

from school, from home, from a friend or from a pay phone. People tend to be comfortable

talking on the phone, so this approach leaves no lasting record of the report, unless messages
taped or transcribed and checked for accuracy. It also requires resources - funds or in-kind

donations for the equipment, the telephone service, and a secure area in which to house the

Equipment.

E-mail and web sites have proved successful in reaching out to those who are electronically

literate. Some systems have both an e-mail box and a web site for crime reports. Both email

and web approaches can provide printed reports to send to appropriate authorities. There are

drawbacks - setting up the web page or e-mail properly (though a youth can probably provide

help). The fact that many Nigerians still may not have convenient access to computers and

the need to ensure security of the system to protect reporters' anonymity is

Required at all cost.

Written and oral reports have the advantage that many people trust the human link more

than the plastic box or the electronics of phones and e-mails. (Jimoh, R. G. et al, 2014).

2.4 TYPES OF CRIME

There are many different types of crimes but generally Crime occurs in a variety of forms,

crimes can be divided into two main categories are:-

1. Major crimes: this crime is most genuine than different violations and incorporates

(murders and assaults, and so forth.) it is helpful to quickly investigate what has occurred

over the most recent 30 years in appreciation of crime examination. Neyroud and Disley

(2007) brought up, since the survey into the imperfect Yorkshire Ripper enquiry (Byford,

1981) there has been a drive to 'institutionalize the way significant wrongdoing

examinations are overseen', Major wrongdoing comprises of the prominent violations,

for example, murder, equipped burglary and non-date assault. These violations can either

be unique cases or sequential. On account of sequential wrongdoings, it is moderately

simple to interface violations together because of clear similitudes regarding business as

usual or portrayals of guilty parties. This connecting is conceivable because of the


similarly low volume of such violations. Significant violations as a rule have a group of

criminologists designated to lead the examination (Jansson, K. 2005).

2. Volume crimes: there are many different types under volume violations and incorporate

(thievery, vehicle wrongdoing, burglary, robbery, harm, and so forth.) Volume

wrongdoing examinations. It expected to give a diagram of the analytical procedure and,

in doing as such, recognize compelling and effective ways to deal with the examination

and recognition of volume wrongdoing. The audit especially intended to feature from the

examination proof those insightful practices and Actions that are probably going to

prompt positive results, conversely volume wrongdoings, for example, theft and

shoplifting are undeniably increasingly predominant. They are normally sequential in

nature as wrongdoers proceed to perpetrate numerous such violations. Property

violations, for example, household theft offenses, submitted by various people are

profoundly comparable and it is uncommon to have a portrayal of the wrongdoers. This

makes it hard to interface violations together, most wrongdoing isn't major.

Singular wrongdoings are of a less genuine nature to society all in all (albeit still genuine

to the people in question). The shear volume of such violations makes diverse kinds of

issues for the specialist. The high level of comparability among violations and the

absence of assets for nitty gritty examination of any one specific wrongdoing makes

issues in both fathoming a wrongdoing and anticipating comparative future violations.

The test for cutting edge programming designers is to apply current example coordinating

and perception procedures to mitigate the issue (Jansson, K. 2005).


2.4 ADVANTAGES OF CRIME REPORTING SYSTEM

Their overall project objective was:

To develop a knowledge-based system that will assist the police in the investigation of

residential break & enter incidents that will illustrate the potential for other applications in

support of police investigations. Eight initial functionality goals were set:

i. Provide support for gathering and recording case data.

ii. Generate suspect characteristics from case parameters.

iii. Provide the investigator with easy access to: - case parameters, other incidents in the

vicinity, similar cases, patrol officer report narrative, witness information, sighting

reports, investigators' notes.

iv. Identify the MO of suspects and cleared cases.

v. Generate a list of possible suspects.

vi. Identify patterns in the area.

vii. Generate reports as appropriate.

viii. Provide a graphics display capability.

ix. This will help the police department to manage their records easily.

x. There is no need for a user to go to the police station to file any complaint.

xi. If the police doesn’t react to the complaints the user can forward it to higher

authorities.

xii. To provide a secure system to users.

xiii. Complaint registration.

xiv. Online first system.

xv. Giving feedback.

xvi. Reduction of workload.


xvii. Security.

xviii. Reduced time consumption.

xix. No paper work needed.

xx. No loss of records.

xxi. Centralized database management.

xxii. Reduce error scope.

2.5 DISADVANTAGE OF CRIME REPORTING SYSTEM

In the existing system only our can see the details of particular information about the police

stations in our state, the existing system has more workload for the authorized person.

Some drawbacks written below.

i. More man power.

ii. Time consuming.

iii. Consumers large volume of pare work.

iv. Needs manual calculations.

v. No direct role for the higher officials.

vi. Damage of machines due to lack of attention.

vii. The size of the database increases day-by-day, increasing the load on the database.

viii. At present there is no back up and data maintenance activity.

ix. Training for simple computer operations is necessary for the users working on the

system.

x. Time consuming

xi. Paper work needed

xii. Loss of records


2.6 Existing Crime Information System

An information system (IS) is any framework that changes over information into valuable

data. Kiirya (2007) depicted data frameworks to comprise of segments that associate to

accomplish the goal of giving data about everyday exercises that administrators can use to

control business activities. A data framework contains such components as equipment,

programming, work force, databases, and systems to achieve its destinations. Wrongdoing

Information System (CIS) is any framework that could be utilized to track violations or

criminal cases which can likewise help in getting data relating to specific wrongdoings. CIS

can be utilized to complete measurement examination of wrongdoing submitted with in an

area for example South-Eastern district, Nigeria. (Ugwuishiwu, et al., 2013).

Existing online crime reporting management system does not have such medium by clients

can put their protest from any area. They need to visit their closest police area and take a

duplicate of the protest for future reference. Numerous residents falter to visit any police

headquarters and subsequently source data can't be kept classified. Now and again clashes

happens between the police headquarters with respect to region, implies which region goes

under their police headquarters and the individual get baffled before setting their gripes. In

the event that any resident is a sufferer of wrongdoing, even in the wake of dialing crisis

number, police individual don't ready to find the precise area of that subject. In this present

framework, client's data will be kept secret and just clients whine will be sent to its closest

police headquarters. Clients gripe number will be sent from the server side naturally. For

distinguishing area and true individual, idea of treats and IP tending to has been utilized.
To dispense with the area clashes between police headquarters, the server will assume an

imperative job. It will look through the location table utilizing IP address and forward

message to that police area from where the message has been gotten. It stores only the current

status of criminals like number of cases.

i. Existing applications manage the data and various information’s about the criminals

and their crimes.

ii. In present manual system the total process of criminal report generation is not so fast

and friendly. To solve this kind of problem proposed a better and automated system.

(Awodele, et al., 2015).

The National Crime Information Center (NCIC) is a USA automated database of archived

criminal equity data accessible to practically every law requirement organization across the

nation. It is an across the country framework worked by the Federal Bureau of Investigation

(FBI) devoted to serving and supporting locally, state, and government criminal equity

offices in their main goal to maintain the law and secure people in general. The NCIC ended

up operational on January 27, 1967, with the objective of helping law requirement in securing

criminals and finding stolen property. This objective has since extended to incorporate

finding missing people and further securing law implementation faculty and the general

population. (Ugwuishiwu, et al., 2013).


3.0 CONCLUSION

The project entitled as "Web based of Online Crime Reporting System" is the web based

application it will be very useful for the police department as well as common peoples. This

software provides facility for reporting online crimes, complaints, missing persons and show

related sections. This software is developed with scalability in mind. Additional modules can

be easily added when necessarily. The software is developed with the modular approach. All

modules in the system have been tested with valid data and invalid data and everything work

successfully. Thus, the system has fulfilled all the objectives identified and is able to replace

the existing system. The project provides much security. The Application is made users

friendly to the maximum so that anyone can run the application provided the could access to

the system via the login password. This project manages all details without any risk. All the

objectives were met with satisfaction. The performance of the system is found to be

satisfactory. From a proper analysis of positive points and constraints on the component, it

can be safely concluded that the product is a highly efficient GUI based component. This

application is working properly and meeting to all user requirements. This component can be

easily plugged in many other systems.

You might also like