DESIGN AND IMPLEMENTATION OF COMPUTERIZED SECURITY INFORMATION SYSTEM
(A CASE STUDY OF ENUGU POLICY COMMAND)
Click here to download our android mobile app to your phone for more materials
COMPLETE PROJECT MATERIAL COST 3000 NAIRA
Note: our case study can be change to suit your desire location . we are here for your success.
ORDER NOW
Account Name : Chi E-Concept Int’l
ACCOUNT NUMBER: 0115939447
Account Name: Chi E-Concept Int’l
Account Name: 3059320631
CALL Customer care on : 08074466939,08063386834.
AFTER PAYMENT SEND YOUR PAYMENT DETAILS TO
08074466939 or 08063386834, YOUR PROJECT TITLE YOU WANT US TO SEND TO YOU, AMOUNT PAID, DEPOSITOR NAME, UR EMAIL ADDRESS,PAYMENT DATE.
WE HAVE SECURITY IN OUR BUSINESS.
MONEY BACK GUARANTEE
ABSTRACT
The world over, it is indisputable that the introduction of computer technology in different facts of life has virtually transformed and entranced information processing, while is very vital in any organization or parastatals of government only a means of information processing, has the technology also proved to be the fastest means of information retrieval, which forms the nucleus of the study. This work tries tox-way the rate role of the computerized security information system as it affects the Nigerian police force, it looks at ways of improving the information management of the force. This research work will cover the following area record information system retirement creating for officers and crime mapping through a data bank of crime related information. A detailed design of a computerized approach that will bring the much needed innovation is given. Also included in this work is paper documentation for the neo system design.
TABLE OF CONTENT
CHAPTER ONE
Introduction
- Statement of the problem
- Purpose of the study
- Aims and objective
- Scope of the study
- Limitation of the study
- Definition of terms
CHAPTER TWO
2.0 Literature review
CHAPTER THREE
3.0 Descriptive and analysis of the existing system
3.1 Fact findings methods used
3.2 Organizational structure
3.3 Objective of the existing system
3.4 Input, process, output analysis
3.5 Information flow diagram
3.6 Problems of the existing system
3.7 Justification of the new system
CHAPTER FOUR
4.0 Description of the system
4.1 Output specification design
4.2 Input specification design
4.3 File design
4.4 Procedure chat
4.5 System requirement
CHAPTER FIVE
5.0 Implementation
5.1 Program design
5.2 Pseudo code
CHAPTER SIX
6.0 Documentation
CHAPTER SEVEN
- Recommendation
- Conclusion
CHAPTER ONE
INTRODUCTION
Information Technology (IT) has set world order turning the world a global village, where information plays an indispensable role.
The federal security information (police) is a special outfit of the Nigeria police force, as a role similar to that of the FBI (Federal Bureau of Intelligence) of the United States (US) information they say is an indispensable force and if we should go by this meaning it buttressed the need at which classified information is to this outfit.
latest project materials and topics
Over the years this outfit had made tremendous impact in combating crime, but in recent times, there has been an advance of crime wave in the country leading to insecurity of life and properties close investigation concerning crime activities reveals that the special outfit of he police force is bedeviled with absolute equipment.
Despite the glint strides taken by this outfit over the years changing their investigation and recording equipment to tape storage cassette as recorders, there are still a lot of surmountable problem which has litterto, reduced eh efficiency bureau, Ogbor-Hill, Aba and other division of the outfit through out Nigeria. The panacea to this may no doubt, le in the introduction of a property designed computer base system which will bring the much desired automation hence a prerequisite for being a member of the world order vis-a-vas information technology.
1.1 STATEMENT OF THE PROBLEM
The statutory duty of the federal security and information bureau (police) is crime prevention and intelligence network while is solely based on information. This information received from conducted investigation, which should be supplied to the bureau within minutes using electron communication. But the take days or weeks and sometimes months if the investigation is carried in a distance area. The storage medium currently at disposal for information is susceptible to unauthorized access and damage.