Chapter Two: Almanie Et Al., 2015
Chapter Two: Almanie Et Al., 2015
Chapter Two: Almanie Et Al., 2015
LITERATURE REVIEW
In this section, we analyze systems that are akin to the proposed system. We will focus on
the systems that are closest in functionality to the CRMS, highlighting their key features,
similarities, history, relationship b/w crime and police, advantages and disadvantages and
existing system.
2.0 INTRODUCTION
Crimes are a typical social issue influencing the personal satisfaction and the monetary
development of a general public. In spite of the fact that wrongdoings could happen all
over, usually offenders chip away at wrongdoing openings they face in most natural regions
for them, by giving an information mining way to deal with decide the most criminal
hotspots and discover the sort, area and time of perpetrated violations, we want to raise
al., 2015).
in an exact, succinct, clear and complete way, which at that point turns into a record of an
offered episode to an invested individual for choice to be made. There are numerous sorts
Crime Reporting System will address the refered to explanations behind not announcing,
yet in addition the need of police offices for progressively precise, complete, and reusable
data that may save their time and assets to designate them to policing the roads An online
and get in contact with each other. It likewise enhances work proficiency of the office.
Utilizing this application data dealing with will be simple and quick and illuminating cases
Crime Report System is a system used to report crimes. It very well may be utilized to
report Crime. This venture is primarily valuable for police headquarters. This framework
will deal with every one of the exercises in a police headquarters utilizing PCs. As of now,
every one of the works are done physically, by mechanizing every one of the exercises
inside a police headquarters can be overseen effectively and successfully, This framework
will deal with every one of the exercises in a police headquarters utilizing PCs, It is a critical
clients and framework engineers. The goals of this application is to keep up a mechanized
Many researchers trust that revealed wrongdoing information are defiled by estimation
mistake emerging from contrasts in police division detailing rehearses crosswise over
announcing by exploited people after some time. Regardless of whether such issues exist,
be that as it may, they don't really block the utilization of revealed wrongdoing
Lately police powers have been improving their conventional strategy for wrongdoing
revealing with new mechanical progressions to build their yield by effectively recording
violations to help their examination (Adderley and Musgrove 1999). Information isn't only
a record of wrongdoings, and it likewise contains important data that could be utilized to
connect wrongdoing scenes dependent on the usual way of doing things (MO) of the
offender(s), recommend which guilty parties might be in charge of the wrongdoing and
furthermore distinguish those wrongdoers who work in groups (guilty party systems) and
so forth. In this day and age, PCs are assuming a noteworthy job in the examination of a
wide range of wrongdoing from those that are considered as volume wrongdoing (thievery,
The role of computers has been increased in all walks of life from the finance sector to
supermarkets. In recent years police forces have been enhancing their traditional method
efficiently recording crimes to aid their investigation (Adderley and Musgrove 1999), Data
is not just a record of crimes, it also contains valuable information that could be used to
link crime scenes based on the modus operandi (MO) of the offender(s), suggest which
offenders may be responsible for the crime and also identify those offenders who work in
teams (offender networks) etc, In today’s world, computers are playing a major role in the
investigation of all types of crime from those that are considered as volume crime (burglary,
vehicle crime, etc.) to major crime such as fraud, drug trafficking, murder etc., It is not an
easy task for a Police analyst to manually unravel the inherent complexities within police
data and this problem is compounded when the analysis is undertaken by a team. The
distribution of the data to the team may cause significant information, which could be
useful to solve the crimes, to be missed as each member is not in possession of all relevant
facts. For a long time, criminologists and statisticians have been applying their skills and
knowledge trying to predict when and where the next set of crimes will occur, with varying
degrees of success. The volume of crime and the greater awareness of modern criminals
put a strain on the existing methods. Human reasoning fails when presented with millions
of records. Therefore, there is clearly a requirement for a tool kit to assist in analyzing the
data which will make the best use of limited resources. (Grover, et al., 2007).
Crime is one of the human security problems confronting humanity across the world.
Nations have grappled to contain the rising incidence of homicide, armed robbery, and
kidnap, drug trafficking, sex trafficking, illegal gun running and host of others, United
Nations Office on Drugs and Crime in 2011 reported that homicides globally were
estimated at 468,000 and more than a third (36%) was estimated to have occurred in Africa,
31% in The Americas, 27% in Asia, 5% in Europe and 1% in the tropical Pacific region 3,
Africa has been on the forefront on global statistics on crime. South Africa and Nigeria
have recorded high incidents of violent and non-violent crimes in recent times. According
to Africa Check, that incidents of murder increased from 15 609 murders in 2011/12 to 16
259 murders in 2012/13 in South Africa, with increase of 650 murder cases or a 4,2%
increase when comparing the total numbers of murders with the previous years5. According
to the same report, murders and attempted murders that take place during aggravated
robbery or inter-group conflict (such as gang or taxi violence), and vigilantism make up
between 35% and 45% of all murders and attempted murders 6. (Osawe, et al., 2015).
Between 1971 and 1975, the United States Department of Justice conducted victimization
conducted in each city. Information was collected on victimization and reporting for a
variety of crimes and is collected in the United States Department of Justice (1975 a, b,
1976) reports. The strength of these data is the availability of city identifiers that can be
linked to the police staffing data collected annually in the FBI's Uniform Crime Reports.
(Levitt, 1998).
The concept of Crime can be viewed as an: illegal act (an action prohibited by Law or
failure to act as required by law); illegal activity that involves breaking the Law; immoral
activity that is considered unacceptable act that is shameful, unwise or regrettable. Crime
by the Law of the Federal republic of Nigeria (FRN, 1999) is defined as „An act or omission
which renders the person doing the act or making the omission liable to punishment under
the criminal code, or any Act or Law” Crime is brought about by the violation of the Law
as established by the government at all levels, Crime is an infraction of both the basic
principles of law and order and the norms of civilized behavior, Crime is an offence against
the value system of a society. The cost and effects of crime vary among the various
segments of the population and touch almost everyone by some degree and in general as
the economic growth and development of countries increase, it would be expected that
crime level reduces, this may not necessarily be. The various cost of crime to victims and
the society or the economy include; loss of income, property losses, loss in community
productivity, etc. Some other cost of crime, which are less tangible; include psychological
trauma on victims and their family and friends, pain and suffering and a lower quality of
life. In all of these and other associated losses, the ultimate cost is loss of life (Osawe, et
al., 2015).
preventative military strategy during the Cold War (Paternoster, 2011). The emphasis of
deterrence theory is that punishment serves as a way to minimize and prevent criminal
behaviors (Ritchey & Nicholson-Crotty, 2011; Rizzolli & Stanca, 2012). Deterrence
operates in two ways (a) specifics and (b) generals (Paternoster, 2010; Piquero, Paternoster,
Pograsky, & Loughran, 2011). Specific deterrence pertains to deterring an individual from
Montaldo (2013) said that crime occurs when someone breaks the law by an overt act,
omission or neglect that can result in punishment. A person who has violated a law, or has
breached a rule, is said to have committed a criminal offense. According to National Crime
Prevention Strategy (1996), Crime results in the deprivation of the rights and dignity of
citizens, and poses a threat to peaceful resolution of differences and rightful participation
of all in the democratic process. It inhibits our citizens from communicating with one
another freely, from engaging in economic activity and prevents entrepreneurs and
investors from taking advantage of the opportunities, which our country offers.
2013).
The measure of the police force systematically influences the willingness of exploited people
wrongdoing reports, at that point UCR information will downplay the genuine adequacy of
police in decreasing wrongdoing. Exploited people might be bound to report violations to the
police when the apparent probability of a wrongdoing being understood is high. Moreover,
the prepared accessibility of a cop at the scene of a wrongdoing may likewise prompt more
wrongdoing reports, and it is anything but difficult to envision that increments in police labor
will influence the probability that native grumblings are authoritatively recorded by police
divisions. On the off chance that detailing/recording inclination (from now on alluded to as
exploitation rate is falling. The way that considerably not exactly 50% of all wrongdoings
secured by the FBI's Uniform Crime Reports are really answered to the police uplifts worry
as a clarification for the inability to reveal a connection between detailed wrongdoings and
police nearness e.g., Greenwood and Wadycki, 1973; Swimmer, 1974; Thaler, 1977, 1978;
CarrHill and Stern, 1979; Cameron, 1988; Devine et al., 1988. (Levitt 1998).
clients to store police office's case subtleties, Complaint Details, First Information Report
(FIR) Details, and so forth. This Software Package permits Police Departments to store every
one of the subtleties identified with the office and use them at whatever point fundamental.
The task reports different cases, FIR report, charge sheet report, Most Wanted Criminals
record, finance, participation reports and furthermore can transfer and view criminal
photographs and filtered archives. The prerequisites for this framework was gathered from
The center mission of the police is to control wrongdoing. Nobody question this. To be sure,
proficient wrongdoing battling appreciates wide open help as the essential system of policing
definitely in light of the fact that it epitomizes a profound promise to this goal. Interestingly,
other proposed methodologies, for example, critical thinking or network policing show up
superficially to obscure this center.' If these techniques were to leave the network
making a decision about the estimation of elective police systems in controlling wrongdoing,
in hunting down approaches to avoid or control genuine wrongdoing, the police search for
hastening causes. While it might be helpful to analyze what some call the underlying drivers
of wrongdoing (e.g., social unfairness, unequal financial chance, poor tutoring, frail family
structures, or dysfunctional behavior), such things are moderately irrelevant from a police
viewpoint since the police practice little impact over them. The police work on the outside
of public activity. They should deal with episodes, circumstances, and individuals as they are
presently not social orders or individuals as they may have been. Hence, the promptly
hastening reasons for genuine wrongdoing are definitely more vital to the police than are
more extensive inquiries regarding the main drivers of wrongdoing. (Moore, et al., 1998).
Crime is a geological. It happens at a particular spot, explicit time and for a particular reason.
It can influence everybody and anybody whenever. Wrongdoings are intricate and
continually evolving. Social and mechanical changes presented new targets, apparatuses and
thought processes in wrongdoing. This online web application for keeping up the best
possible everyday citizens grievances for the police office by utilizing this application
individuals, who are apprehensive or don't have enough time to go the police headquarters
for griping about their own legitimate issues here they can give their protest through online
to record any kind of grumbling. It comprises of grumbling box where the general population
can enroll their grievances. Here clients will have the mindfulness about laws and the
The event of wrongdoing isn't irregular. It is spatially conveyed in examples a few examples
are found while others are most certainly not. Factor, for example, social class, salary level
and the condition plays parts in the sorts of wrongdoing that are submitted. Assets and
additionally an absence of assets can impact the likelihood of wrongdoings submitted in some
occasion of this, deserving of the state." Management, then again, is the way toward
coordinating and controlling the assets of an association such As its staff, materials, and
hardware to accomplish the objectives of the association. Wrongdoing the board is thusly
characterized as controlling, coordinating, and organizing police assets (cash, gear, and
faculty) to keep the infringement of law and where it has been damaged, to secure the culprits
The past discoveries are enough to persuade readers regarding the significance that
detailing conduct has for the criminal equity framework and the network. Residents,
through the detailing of their wrongdoing encounters begin the criminal equity hardware
preliminary of guilty parties, and their discipline. The deterrent impact of criminal equity is
potentiated too, then again, non-announcing blocks access to remuneration plans, guilty
parties not being captured, and the objective of an increasingly evenhanded criminal equity
framework being accomplished. Be that as it may, not all the exploitation occurrences are
wrongdoings in a specialized sense, and of those which are, some are minor for sure, the
police will total criminal offense reports in just few these episodes. Expanded readiness to
report what individuals see as violations would result in expanded police endeavors in
managing minor episodes, not all of which may result in attractive results to the people in
question; an issue with possibly pessimistic ramifications for the detailing of maybe
arrangement of variables going from earnestness of episodes to trust in the criminal equity
framework, A progressively total comprehension of non-announcing, its dispersion and its
associates will enable us to evaluate the execution of our criminal equity offices.
• Oral reports
The tip box usually consists of several locked boxes at key points around the school or
neighborhood. Each box has a slot for inserting written reports. Boxes need to be located in
Places that are reasonably populated - not deserted and not in the middle of heavy traffic.
The box (and education about using it) should remind students and citizens of what's needed
For a good report - a dated, legible note describing as much as possible what happened where,
when, how and by whom. Advantages of the tip box include low cost, low reliance of
technology and written records. Disadvantages include unreadable reports and limited access.
Tip boxes also require that someone physically visit and collect reports from each of
The boxes.
Some include a toll-free line directed to a cell phone. Some reporting lines are partnered with
a hotline. Calls left on a voicemail or answering machine can be retrieved from anywhere.
The report taker doesn't have to visit boxes. The telephone approach allows students to call
from school, from home, from a friend or from a pay phone. People tend to be comfortable
talking on the phone, so this approach leaves no lasting record of the report, unless messages
taped or transcribed and checked for accuracy. It also requires resources - funds or in-kind
donations for the equipment, the telephone service, and a secure area in which to house the
Equipment.
E-mail and web sites have proved successful in reaching out to those who are electronically
literate. Some systems have both an e-mail box and a web site for crime reports. Both email
and web approaches can provide printed reports to send to appropriate authorities. There are
drawbacks - setting up the web page or e-mail properly (though a youth can probably provide
help). The fact that many Nigerians still may not have convenient access to computers and
Written and oral reports have the advantage that many people trust the human link more
than the plastic box or the electronics of phones and e-mails. (Jimoh, R. G. et al, 2014).
There are many different types of crimes but generally Crime occurs in a variety of forms,
1. Major crimes: this crime is most genuine than different violations and incorporates
(murders and assaults, and so forth.) it is helpful to quickly investigate what has occurred
over the most recent 30 years in appreciation of crime examination. Neyroud and Disley
(2007) brought up, since the survey into the imperfect Yorkshire Ripper enquiry (Byford,
1981) there has been a drive to 'institutionalize the way significant wrongdoing
for example, murder, equipped burglary and non-date assault. These violations can either
2. Volume crimes: there are many different types under volume violations and incorporate
in doing as such, recognize compelling and effective ways to deal with the examination
and recognition of volume wrongdoing. The audit especially intended to feature from the
examination proof those insightful practices and Actions that are probably going to
prompt positive results, conversely volume wrongdoings, for example, theft and
violations, for example, household theft offenses, submitted by various people are
Singular wrongdoings are of a less genuine nature to society all in all (albeit still genuine
to the people in question). The shear volume of such violations makes diverse kinds of
issues for the specialist. The high level of comparability among violations and the
absence of assets for nitty gritty examination of any one specific wrongdoing makes
The test for cutting edge programming designers is to apply current example coordinating
To develop a knowledge-based system that will assist the police in the investigation of
residential break & enter incidents that will illustrate the potential for other applications in
iii. Provide the investigator with easy access to: - case parameters, other incidents in the
vicinity, similar cases, patrol officer report narrative, witness information, sighting
ix. This will help the police department to manage their records easily.
x. There is no need for a user to go to the police station to file any complaint.
xi. If the police doesn’t react to the complaints the user can forward it to higher
authorities.
In the existing system only our can see the details of particular information about the police
stations in our state, the existing system has more workload for the authorized person.
vii. The size of the database increases day-by-day, increasing the load on the database.
ix. Training for simple computer operations is necessary for the users working on the
system.
x. Time consuming
An information system (IS) is any framework that changes over information into valuable
data. Kiirya (2007) depicted data frameworks to comprise of segments that associate to
accomplish the goal of giving data about everyday exercises that administrators can use to
programming, work force, databases, and systems to achieve its destinations. Wrongdoing
Information System (CIS) is any framework that could be utilized to track violations or
criminal cases which can likewise help in getting data relating to specific wrongdoings. CIS
Existing online crime reporting management system does not have such medium by clients
can put their protest from any area. They need to visit their closest police area and take a
duplicate of the protest for future reference. Numerous residents falter to visit any police
headquarters and subsequently source data can't be kept classified. Now and again clashes
happens between the police headquarters with respect to region, implies which region goes
under their police headquarters and the individual get baffled before setting their gripes. In
the event that any resident is a sufferer of wrongdoing, even in the wake of dialing crisis
number, police individual don't ready to find the precise area of that subject. In this present
framework, client's data will be kept secret and just clients whine will be sent to its closest
police headquarters. Clients gripe number will be sent from the server side naturally. For
distinguishing area and true individual, idea of treats and IP tending to has been utilized.
To dispense with the area clashes between police headquarters, the server will assume an
imperative job. It will look through the location table utilizing IP address and forward
message to that police area from where the message has been gotten. It stores only the current
i. Existing applications manage the data and various information’s about the criminals
ii. In present manual system the total process of criminal report generation is not so fast
and friendly. To solve this kind of problem proposed a better and automated system.
The National Crime Information Center (NCIC) is a USA automated database of archived
criminal equity data accessible to practically every law requirement organization across the
nation. It is an across the country framework worked by the Federal Bureau of Investigation
(FBI) devoted to serving and supporting locally, state, and government criminal equity
offices in their main goal to maintain the law and secure people in general. The NCIC ended
up operational on January 27, 1967, with the objective of helping law requirement in securing
criminals and finding stolen property. This objective has since extended to incorporate
finding missing people and further securing law implementation faculty and the general
The project entitled as "Web based of Online Crime Reporting System" is the web based
application it will be very useful for the police department as well as common peoples. This
software provides facility for reporting online crimes, complaints, missing persons and show
related sections. This software is developed with scalability in mind. Additional modules can
be easily added when necessarily. The software is developed with the modular approach. All
modules in the system have been tested with valid data and invalid data and everything work
successfully. Thus, the system has fulfilled all the objectives identified and is able to replace
the existing system. The project provides much security. The Application is made users
friendly to the maximum so that anyone can run the application provided the could access to
the system via the login password. This project manages all details without any risk. All the
objectives were met with satisfaction. The performance of the system is found to be
satisfactory. From a proper analysis of positive points and constraints on the component, it
can be safely concluded that the product is a highly efficient GUI based component. This
application is working properly and meeting to all user requirements. This component can be