DESIGN AND IMPLEMENTATION OF A COMPUTERIZED SECURITY INFORMATION SYSTEM FOR ENUGU STATE (A CASE STUDY OF NIGERIA POLICE FORCE)

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU2195
  • Access Fee: ₦5,000 ($14)
  • Pages: 59 Pages
  • Format: Microsoft Word
  • Views: 362
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853
ABSTRACT

Security of life and property is an essential need of an individual as well as a generate body. This calls for the need for a well-organized information security system.
Before the advent of computers, there was no security of vital information’s, files where pulled out from  cabinets from sections, which might result to misplacement of individual files, and documents as a result this project was implemented.
This project emphasis on information which is produced in a way understandable by man and the need to store this information so that need to store this information so that it can be referenced when necessary, it also describes how all these could be done electronically. It shows how information could be stored, modified and recalled instantly and accurately through computerization with out access by authorized persons.

ORGANIZATION OF WORK

This work is divided into four sections namely the preliminaries, the chapters, the bibliography and the appendices. The preliminaries, the abstracts, dedications, acknowledgement, table of contents and the list of appendices.
The chapters were divided into seven, chapter one treats the problem and its setting. This includes the statement of the problems, purpose of the study, aims and objectives, scope and delimitation, limitations and constraint assumptions and defection of terms.
Chapter two treats the review of related literature which includes introduction, and a brief description of our police services. 
Chapter three treats the description and analysis of the existing system, organization chart, information flow diagram.
Chapter four treats the design of the new system which involves the procedure, chart, file design, system flowchart and system requirement.
Chapter five of this study discusses the implementation of the new system.
Chapter six discusses the documentation of the new system.
Chapter seven summaries the entire work in a nutshell bringing into view its recommendation for future study.
The bibliography entitle the author’s name and books consulted during the course of the study.
Finally, the appendices comprises the program used to test the thesis.

TABLE OF CONTENTS
Cover page
Title page
Certification
Dedication
Acknowledgement
Abstract
Organization of the work
Table of contents

CHAPTER ONE
Introduction
1.1 Background of the study
1.2 Statement of problem
1.3 Purpose of study
1.4 Scope of study
1.5 Limitations
1.6 Assumption
1.7 Definition of terms

CHAPTER TWO
Literature review

CHAPTER THREE
Descriptions and analysis of the existing system
3.1 General description of the existing system
3.2 Methods of fact finding used
3.3 The organizational structure
3.4 Objectives of the existing system
3.5 Input, process, and output analysis
3.6 Information flow diagram
3.7 Problem of the existing system
3.8 Justification for the new system

CHAPTER FOUR
Design of the new system
4.1 Output specifications and design
4.2 Input specifications and design
4.3 File design
4.4 Procedure chart
4.5 System flowchart
4.6 System requirements

CHAPTER FIVE
Implementation
5.1 Program design
5.2 Program flow chart
5.3 Psendocodes
5.4 Sources programs
5.5 Test run

CHAPTER SIX
Documentation
6.1 System documentation
6.2 Program documentation
6.3 User documentation

CHAPTER SEVEN
Conclusion and Recommendation
7.1 Conclusion
7.2 Recommendation
    Bibliography

DESIGN AND IMPLEMENTATION OF A COMPUTERIZED SECURITY INFORMATION SYSTEM FOR ENUGU STATE (A CASE STUDY OF NIGERIA POLICE FORCE)
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU2195
  • Access Fee: ₦5,000 ($14)
  • Pages: 59 Pages
  • Format: Microsoft Word
  • Views: 362
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU2195
    Fee ₦5,000 ($14)
    No of Pages 59 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT Security of life and property is an essential need of an individual as well as a generate body. This calls for the need for a well-organized information security system. Before the advent of computers, there was no security of vital information’s, files where pulled out from cabinets from sections, which might result to... Continue Reading
    ABSTRACT Security of life and property is an essential need of an individual as well as a generate body. This calls for the need for a well-organized information security system. Before the advent of computers, there was no security of vital information’s, files where pulled out from  cabinets from sections, which might result to... Continue Reading
    TABLE OF CONTENTS Title Page- - - Approval page- - Certification- - Dedication - - Acknowledgement - Table of contents- List of figures- List of tables- - Abstract- - - CHAPTER ONE - - - - - - - -i - - - - - - - -ii - - - - - - - -iii - - - - - - - -iv - - - - - - - -v - - - - - - - -vi - - - - - - - -x - - - - - - - -xi - - - - - - - -xii 1.0... Continue Reading
    DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM (A CASE STUDY OF THE NIGERIAN POLICE) ABSTRACT The principal objective of this project is to help Security Information Systems (SIS) especially NIGERIAN POLICE which is my case study in the area they encounter problems in securing security data-processing and efficient information system.... Continue Reading
    ABSTRACT The need to develop a Computerized Commodity exchange information system that will provide information and keep record of transaction made on commodities has become pressing due to the rapid growth of industries that make use of these commodities and the inefficiency of manual keeping of all transaction made. The information was got from... Continue Reading
    ABSTRACT The need to develop a Computerized Commodity exchange information system that will provide information and keep record of transaction made on commodities has become pressing due to the rapid growth of industries that make use of these commodities and the inefficiency of manual keeping of all transaction made. The information was got from... Continue Reading
    ABSTRACT Security of life and property is an essential need of an individual as well as a generate body. This calls for the need for a well-organized information security system.s Before the advent of computers, there was no security of vital information’s, files where pulled out from  cabinets from sections, which might result to misplacement... Continue Reading
    DESIGN AND IMPLEMENTATION OF A COMPUTERIZED SECURITY INFORMATION SYSTEM (A CASE STUDY OF NIGERIA POLICE FORCE)             TABLE OF CONTENTS Cover page Title page Certification Dedication Acknowledgement Abstract Organization of the work Table of contents     Introduction 1.1    Background of the study 1.2    Statement of problem 1.3... Continue Reading
    DESIGN AND IMPLEMENTATION OF A COMPUTERIZED SECURITY INFORMATION SYSTEM (A CASE STUDY OF NIGERIA POLICE FORCE) TABLE OF CONTENTS Cover page Title page Certification Dedication Acknowledgement Abstract Organization of the work Table of contents Introduction 1.1 Background of the study 1.2 Statement of problem 1.3 Purpose of study 1.4 Scope of study... Continue Reading
    ABSTRACT This project work identifies the challenges facing police departments that seek to implement computerized crime tracking information systems. The project highlights the importance of police departments identifying crime records and then designing systems that accomplish the tasks specific to the needs of their end-users. Data transfer,... Continue Reading
    Call Us
    whatsappWhatsApp Us